default search action
Zhenxiang Chen
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2025
- [j45]Ying Pang, Lizhi Peng, Haibo Zhang, Zhenxiang Chen, Bo Yang:
Imbalanced ensemble learning leveraging a novel data-level diversity metric. Pattern Recognit. 157: 110886 (2025) - 2024
- [j44]Xinyu Liu, Kun Ma, Ke Ji, Zhenxiang Chen, Bo Yang:
Graph-based multi-information integration network with external news environment perception for Propaganda detection. Int. J. Web Inf. Syst. 20(2): 195-212 (2024) - [j43]Jiaqi Fang, Kun Ma, Yanfang Qiu, Ke Ji, Zhenxiang Chen, Bo Yang:
SEN-CTD: semantic enhancement network with content-title discrepancy for fake news detection. Int. J. Web Inf. Syst. 20(6): 603-620 (2024) - [j42]Lei Zhang, Yazhou Ma, Xiaojie Fan, Xiaochen Fan, Yonggang Zhang, Zhenxiang Chen, Xianyi Chen, Daqing Zhang:
Wi-Diag: Robust Multisubject Abnormal Gait Diagnosis With Commodity Wi-Fi. IEEE Internet Things J. 11(3): 4362-4376 (2024) - [j41]Peiran Peng, Zhenxiang Chen, Jianan Li, Shuaihao Han, Tongtong Gao, Lang Hong, Tingfa Xu:
Feature-Enhanced Convolutional Attention for Unstable Rock Detection in Aerial Images. IEEE Geosci. Remote. Sens. Lett. 21: 1-5 (2024) - [j40]Mohammed Shujaa Aldeen, Chuan Zhao, Zhenxiang Chen, Liming Fang, Zhe Liu:
Privacy-Preserving Collaborative Learning for Genome Analysis via Secure XGBoost. IEEE Trans. Dependable Secur. Comput. 21(6): 5755-5765 (2024) - [j39]Zhenxiang Chen, Tingfa Xu, Yongzhuo Pan, Ning Shen, Huan Chen, Jianan Li:
Edge Feature Enhancement for Fine-Grained Segmentation of Remote Sensing Images. IEEE Trans. Geosci. Remote. Sens. 62: 1-13 (2024) - [c100]Hui Liu, Ke Ji, Zhenxiang Chen, Kun Ma, Xiaofan Zhao:
Malicious Attack Detection Method for Recommendation Systems Based on Meta-pseudo Labels and Dynamic Features. APWeb/WAIM (4) 2024: 379-393 - [c99]Yuchen Liu, Shanshan Wang, Jin Au-Yeung, Zhenxiang Chen:
Encrypted Malicious Traffic Detection Based on Graph Convolutional Network and Temporal Dissection. CSCWD 2024: 187-192 - [c98]Aihua Yang, Tianke Fang, Elcid A. Serrano, Yusen Chi, Fucai Liu, Zhenxiang Chen:
Inspection Robot Fault Detection Based on Electric Power Big Data and Target Detection Algorithm. FAIML 2024: 153-156 - [c97]Changlin Liu, Shanshan Wang, Zhenxiang Chen, Limei Huang, Yan Li, Hanwen Li:
KGhish: A Phishing Website Detection Method Based on Knowledge Graph. ICIC (13) 2024: 300-311 - [c96]Hanwen Li, Shanshan Wang, Yadi Han, Changlin Liu, Zhenxiang Chen:
Constructing Adversarial Network Attacks in Realistic Network Environments. ICIC (9) 2024: 422-435 - [c95]Amina El Garne, Yunan Wei, Yucheng Lin, Shengnan Zhao, Chuan Zhao, Zhenxiang Chen:
Secure and Robust Privacy-Preserving Federated Learning For Heterogeneous Resource. ICICS (1) 2024: 251-270 - [c94]Huan Chen, Tingfa Xu, Zhenxiang Chen, Peifu Liu, Huiyan Bai, Jianan Li:
Multi-scale Change-Aware Transformer for Remote Sensing Image Change Detection. ACM Multimedia 2024: 2992-3000 - [c93]Yongxin Yu, Ke Ji, Yuan Gao, Zhenxiang Chen, Kun Ma, Jun Wu:
MHDF: Multi-source Heterogeneous Data Progressive Fusion for Fake News Detection. PAKDD (5) 2024: 28-39 - 2023
- [j38]Kun Ma, Changhao Tang, Weijuan Zhang, Benkuan Cui, Ke Ji, Zhenxiang Chen, Ajith Abraham:
DC-CNN: Dual-channel Convolutional Neural Networks with attention-pooling for fake news detection. Appl. Intell. 53(7): 8354-8369 (2023) - [j37]Benkuan Cui, Kun Ma, Leping Li, Weijuan Zhang, Ke Ji, Zhenxiang Chen, Ajith Abraham:
Intra-graph and Inter-graph joint information propagation network with third-order text graph tensor for fake news detection. Appl. Intell. 53(16): 18971-18988 (2023) - [j36]Jing Chen, Kun Ma, Ke Ji, Zhenxiang Chen:
TM-HOL: Topic memory model for detection of hate speech and offensive language. Concurr. Comput. Pract. Exp. 35(14) (2023) - [j35]Abbas Arghavani, Haibo Zhang, Zhiyi Huang, Yawen Chen, Zhenxiang Chen:
Tuatara: Location-Driven Power-Adaptive Communication for Wireless Body Area Networks. IEEE Trans. Mob. Comput. 22(1): 574-588 (2023) - [c92]Shuhao Yan, Shanshan Wang, Zhenxiang Chen, Xiaoqing Jiang, Xueyang Cao:
CSLog: Anomaly Detection for Syslog Based on Contrastive Self-Supervised Representation Learning. APNOMS 2023: 165-170 - [c91]Chenghan Wang, Shanshan Wang, Chuan Zhao, Xueyang Cao, Shuhao Yan, Yadi Han, Limei Huang, Zhenxiang Chen:
The Secondary Isolated Data Island: Isolated Data Island Caused by Blockchain in Federated Learning. BIBM 2023: 4159-4166 - [c90]Hucheng Wang, Zhenxiang Chen, Xiaoqing Jiang, Bo Yang:
Estimate Heart Rate from Recovered Facial Signal. BIC 2023: 50-54 - [c89]Zhengli Wang, Zhenxiang Chen, Xiaoqing Jiang, Peicheng Wang, Hucheng Wang:
Prediction method for college student's mental health state based on association rules. BIC 2023: 367-371 - [c88]Daokuan Bai, Shanshan Wang, Wenyue Wang, Hua Wang, Chuan Zhao, Peng Yuan, Zhenxiang Chen:
Overcoming Noisy Labels in Federated Learning Through Local Self-Guiding. CCGrid 2023: 367-376 - [c87]Weiliang Zheng, Zhenxiang Chen, Yang Li, Xiaoqing Jiang, Xueyang Cao:
Speaker recognition system of flexible throat microphone using contrastive learning. CCGrid 2023: 640-650 - [c86]Chenghan Wang, Shanshan Wang, Chuan Zhao, Wenyue Wang, Bin Hu, Youmian Wang, Lin Wang, Zhenxiang Chen:
Decentralized Reinforced Anonymous FLchain: a Secure Federated Learning Architecture for the Medical Industry. COMPSAC 2023: 396-405 - [c85]Yadi Han, Shanshan Wang, Yiwen Li, Xueyang Cao, Limei Huang, Zhenxiang Chen:
Measurement of Illegal Android Gambling App Ecosystem From Joint Promotion Perspective. DSAA 2023: 1-11 - [c84]Peicheng Wang, Zhenxiang Chen, Xiaoqing Jiang, Yanqi Song:
Psychological Stress Assessment Method Based on Learning Using Privileged Information Framework. ICBIP 2023: 91-97 - [c83]Peng Yuan, Shanshan Wang, Chuan Zhao, Wenyue Wang, Daokuan Bai, Lizhi Peng, Zhenxiang Chen:
Adversarial Attack with Genetic Algorithm against IoT Malware Detectors. ICC 2023: 1413-1418 - [c82]Yuhui Zhu, Zhenxiang Chen, Qiben Yan, Shanshan Wang, Alberto Giaretta, Enlong Li, Lizhi Peng, Chuan Zhao, Mauro Conti:
Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders. ICC 2023: 2338-2344 - [c81]Yiwen Li, Shanshan Wang, Zhenxiang Chen, Xueyang Cao, Yadi Han:
Exploring Wi-Fi Privacy Disclosure: A Novel Approach to User Identity Prediction Based on Traffic Multi-level Information. ICPADS 2023: 2049-2056 - [c80]Yongxin Yu, Ke Ji, Yuan Gao, Zhenxiang Chen, Kun Ma, Jun Wu:
Multimodal Fake News Detection Based on Multi-source Heterogeneous Data Fusion. PAAP 2023: 1-6 - [c79]Limei Huang, Shanshan Wang, Changlin Liu, Xueyang Cao, Yadi Han, Shaolei Liu, Zhenxiang Chen:
Low-Frequency Aware Unsupervised Detection of Dark Jargon Phrases on Social Platforms. PRICAI (2) 2023: 198-209 - [c78]Jun Xu, Shengnan Zhao, Chuan Zhao, Zhenxiang Chen, Zhe Liu, Liming Fang:
Practical Single-Round Secure Wildcard Pattern Matching. SEC 2023: 87-101 - [c77]Jin Au-Yeung, Shanshan Wang, Yuchen Liu, Zhenxiang Chen:
Safety or Not? A Comparative Study for Deep Learning Apps on Smartphones. TrustCom 2023: 109-116 - 2022
- [j34]Haixin Jia, Mohammed Shujaa Aldeen, Chuan Zhao, Shan Jing, Zhenxiang Chen:
Flexible privacy-preserving machine learning: When searchable encryption meets homomorphic encryption. Int. J. Intell. Syst. 37(11): 9173-9191 (2022) - [j33]Shuangrong Liu, Lin Wang, Bo Yang, Jin Zhou, Zhenxiang Chen, Huifen Dong:
Improvement of Neural-Network Classifiers Using Fuzzy Floating Centroids. IEEE Trans. Cybern. 52(3): 1392-1404 (2022) - [j32]Yuxi Xie, Min Qiu, Haibo Zhang, Lizhi Peng, Zhenxiang Chen:
Gaussian Distribution Based Oversampling for Imbalanced Data Classification. IEEE Trans. Knowl. Data Eng. 34(2): 667-679 (2022) - [c76]Yanqiang Li, Ke Ji, Kun Ma, Zhenxiang Chen, Jin Zhou, Jun Wu:
Fake News Detection Based on the Correlation Extension of Multimodal Information. APWeb/WAIM (1) 2022: 443-450 - [c75]Xueyang Cao, Shanshan Wang, Zhenxiang Chen, Xiaoqing Jiang, Weiliang Zheng, Yadi Han:
Decision-based adversarial attack for speaker recognition models. CSAI 2022: 278-283 - [c74]Nasimul Hasan, Zhenxiang Chen, Chuan Zhao, Yuhui Zhu, Cong Liu:
IoT Botnet Detection framework from Network Behavior based on Extreme Learning Machine. INFOCOM Workshops 2022: 1-6 - [c73]Wenyue Wang, Shanshan Wang, Daokuan Bai, Chuan Zhao, Lizhi Peng, Zhenxiang Chen:
SFMD: A Semi-Supervised Federated Malicious Traffic Detection Approach in IoT. ISPA/BDCloud/SocialCom/SustainCom 2022: 774-781 - [c72]Tianqi Ren, Ke Ji, Zhenxiang Chen, Runyuan Sun, Kun Ma, Jin Zhou:
Fake news detection method based on multi-feature fusion of entity and structured text. PAAP 2022: 1-6 - [c71]Youmian Wang, Bin Hu, Zhenxiang Chen, Xiaoqing Jiang, Wenjuan Liu, Peicheng Wang:
INSIDER: A framework for assessing confidence in psychological scales based on multi-modal physiological signal fusion. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 1298-1303 - [i5]Yuhui Zhu, Zhenxiang Chen, Qiben Yan, Shanshan Wang, Enlong Li, Lizhi Peng, Chuan Zhao:
Mining Function Homology of Bot Loaders from Honeypot Logs. CoRR abs/2206.00385 (2022) - [i4]Yuhui Zhu, Zhenxiang Chen, Qiben Yan, Shanshan Wang, Alberto Giaretta, Enlong Li, Lizhi Peng, Chuan Zhao, Mauro Conti:
Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders. CoRR abs/2211.14790 (2022) - 2021
- [j31]Yong-Feng Ge, Jinli Cao, Hua Wang, Zhenxiang Chen, Yanchun Zhang:
Set-Based Adaptive Distributed Differential Evolution for Anonymity-Driven Database Fragmentation. Data Sci. Eng. 6(4): 380-391 (2021) - [j30]Zhihao Hou, Kun Ma, Yufeng Wang, Jia Yu, Ke Ji, Zhenxiang Chen, Ajith Abraham:
Attention-based learning of self-media data for marketing intention detection. Eng. Appl. Artif. Intell. 98: 104118 (2021) - [j29]Anli Yan, Zhenxiang Chen, Haibo Zhang, Lizhi Peng, Qiben Yan, Muhammad Umair Hassan, Chuan Zhao, Bo Yang:
Effective detection of mobile malware behavior based on explainable deep neural network. Neurocomputing 453: 482-492 (2021) - [j28]Lijun Sun, Qian Yang, Xiao Chen, Zhenxiang Chen:
RC-chain: Reputation-based crowdsourcing blockchain for vehicular networks. J. Netw. Comput. Appl. 176: 102956 (2021) - [c70]Qian Zhang, Shan Jing, Chuan Zhao, Bo Zhang, Zhenxiang Chen:
Efficient Federated Learning Framework Based on Multi-Key Homomorphic Encryption. 3PGCIC 2021: 88-105 - [c69]Hanchen Xu, Zhenxiang Chen, Shanshan Wang, Xiaoqing Jiang:
Chinese NER Using ALBERT and Multi-word Information. ACM TUR-C 2021: 141-145 - [c68]Nobukazu Yoshioka, Jati H. Husen, Hnin Thandar Tun, Zhenxiang Chen, Hironori Washizaki, Yoshiaki Fukazawa:
Landscape of Requirements Engineering for Machine Learning-based AI Systems. APSEC Workshops 2021: 5-8 - [c67]Zhenxiang Chen, Wangwang Yu, Haohan Bai, Yong Li:
An Arcloss-Based and Openset-Test-Oriented Finger Vein Recognition System. CCBR 2021: 287-294 - [c66]Yanqi Li, Ke Ji, Kun Ma, Zhenxiang Chen, Jun Wu, Yidong Li:
Enhancing Fake News Classification by Generating Neural Fake Samples. DTPI 2021: 152-155 - [c65]Hao Li, Shanqing Guo, Peng Tang, Chengyu Hu, Zhenxiang Chen:
TranFuzz: An Ensemble Black-Box Attack Framework Based on Domain Adaptation and Fuzzing. ICICS (1) 2021: 260-275 - [c64]Cong Liu, Anli Yan, Zhenxiang Chen, Haibo Zhang, Qiben Yan, Lizhi Peng, Chuan Zhao:
IEdroid: Detecting Malicious Android Network Behavior Using Incremental Ensemble of Ensembles. ICPADS 2021: 788-795 - [c63]Gang Zhang, Hao Li, Zhenxiang Chen, Lizhi Peng, Yuhui Zhu, Chuan Zhao:
AndroCreme: Unseen Android Malware Detection Based on Inductive Conformal Learning. TrustCom 2021: 651-658 - [c62]Yanqi Li, Ke Ji, Kun Ma, Zhenxiang Chen, Jun Wu, Yidong Li, Guandong Xu:
HACK: A Hierarchical Model for Fake News Detection. WISE (1) 2021: 565-572 - [c61]Xiaoqi Lv, Ke Ji, Zhenxiang Chen, Kun Ma, Jun Wu, Yidong Li, Guandong Xu:
Expert Recommendations with Temporal Dynamics of User Interest in CQA. WISE (1) 2021: 645-652 - 2020
- [j27]Ravinder Singh, Sudha Subramani, Jiahua Du, Yanchun Zhang, Hua Wang, Khandakar Ahmed, Zhenxiang Chen:
Deep Learning for Multi-Class Antisocial Behavior Identification From Twitter. IEEE Access 8: 194027-194044 (2020) - [j26]Jifeng Guo, Meihui Li, Lin Wang, Bo Yang, Liangliang Zhang, Zhenxiang Chen, Shi-Yuan Han, Laura García-Hernandez, Ajith Abraham:
Estimating cement compressive strength using three-dimensional microstructure images and deep belief network. Eng. Appl. Artif. Intell. 88 (2020) - [j25]Yufeng Wang, Kun Ma, Laura García-Hernández, Jing Chen, Zhihao Hou, Ke Ji, Zhenxiang Chen, Ajith Abraham:
A CLSTM-TMN for marketing intention detection. Eng. Appl. Artif. Intell. 91: 103595 (2020) - [j24]Qi Zhao, Chuan Zhao, Shujie Cui, Shan Jing, Zhenxiang Chen:
PrivateDL PrivateDL : Privacy-preserving collaborative deep learning against leakage from gradient sharing. Int. J. Intell. Syst. 35(8): 1262-1279 (2020) - [j23]Shanshan Wang, Zhenxiang Chen, Qiben Yan, Ke Ji, Lizhi Peng, Bo Yang, Mauro Conti:
Deep and broad URL feature mining for android malware detection. Inf. Sci. 513: 600-613 (2020) - [j22]Chuan Zhao, Shengnan Zhao, Bo Zhang, Shan Jing, Zhenxiang Chen, Minghao Zhao:
Oblivious DFA evaluation on joint input and its applications. Inf. Sci. 528: 168-180 (2020) - [j21]Anqi Teng, Lizhi Peng, Yuxi Xie, Haibo Zhang, Zhenxiang Chen:
Gradient descent evolved imbalanced data gravitation classification with an application on Internet video traffic identification. Inf. Sci. 539: 447-460 (2020) - [c60]Bing Han, Zhenxiang Chen, Cong Liu, Mingyue Shang:
Design and Implementation of Big Data Management Platform for Android Applications. ICBDT 2020: 36-40 - [c59]Zhenxiang Chen, Hironori Washizaki, Yoshiaki Fukazawa:
Automated Tool for Revising Masking MC/DC Test Suite. ISSRE Workshops 2020: 157-158 - [c58]Anli Yan, Zhenxiang Chen, Riccardo Spolaor, Shuaishuai Tan, Chuan Zhao, Lizhi Peng, Bo Yang:
Network-based Malware Detection with a Two-tier Architecture for Online Incremental Update. IWQoS 2020: 1-10 - [c57]Yong-Feng Ge, Jinli Cao, Hua Wang, Yanchun Zhang, Zhenxiang Chen:
Distributed Differential Evolution for Anonymity-Driven Vertical Fragmentation in Outsourced Data Storage. WISE (2) 2020: 213-226 - [i3]Lijun Sun, Qian Yang, Xiao Chen, Zhenxiang Chen:
RC-chain: Reputation-based Crowdsourcing Blockchain for Vehicular Networks. CoRR abs/2012.11120 (2020)
2010 – 2019
- 2019
- [j20]Yuxi Xie, Lizhi Peng, Zhenxiang Chen, Bo Yang, Hongli Zhang, Haibo Zhang:
Generative learning for imbalanced data using the Gaussian mixed model. Appl. Soft Comput. 79: 439-451 (2019) - [j19]Chuan Zhao, Shengnan Zhao, Minghao Zhao, Zhenxiang Chen, Chong-Zhi Gao, Hongwei Li, Yu-an Tan:
Secure Multi-Party Computation: Theory, practice and applications. Inf. Sci. 476: 357-372 (2019) - [j18]Ying Pang, Lizhi Peng, Zhenxiang Chen, Bo Yang, Hongli Zhang:
Imbalanced learning based on adaptive weighting and Gaussian function synthesizing with an application on Android malware detection. Inf. Sci. 484: 95-112 (2019) - [j17]Hanbo Deng, Lizhi Peng, Haibo Zhang, Bo Yang, Zhenxiang Chen:
Ranking-based biased learning swarm optimizer for large-scale optimization. Inf. Sci. 493: 120-137 (2019) - [j16]Shanshan Wang, Zhenxiang Chen, Qiben Yan, Bo Yang, Lizhi Peng, Zhongtian Jia:
A mobile malware detection method using behavior features in network traffic. J. Netw. Comput. Appl. 133: 15-25 (2019) - [c56]Ke Ji, Yahan Yuan, Kun Ma, Runyuan Sun, Zhenxiang Chen, Jun Wu:
Context-aware recommendations via a tree-based ensemble framework. ACM TUR-C 2019: 50:1-50:5 - [c55]Ke Ji, Yahan Yuan, Ruanyuan Sun, Lin Wang, Kun Ma, Zhenxiang Chen:
Abnormal telephone identification via an ensemble-based classification framework. ACM TUR-C 2019: 63:1-63:6 - [c54]Yahan Yuan, Ke Ji, Runyuan Sun, Kun Ma, Zhenxiang Chen, Lin Wang:
An Integration Method Of Classifiers For Abnormal Phone Detection. BESC 2019: 1-6 - [c53]Anqi Teng, Lizhi Peng, Yuxi Xie, Haibo Zhang, Zhenxiang Chen:
Imbalanced Data Gravitation Classification Model Using For Internet Video Traffic Identification. BigDataSecurity/HPSC/IDS 2019: 172-177 - [c52]Chuan Zhao, Shengnan Zhao, Bo Zhang, Shan Jing, Zhenxiang Chen, Minghao Zhao:
Towards Secure Computation of Similar Patient Query on Genomic Data Under Multiple Keys. CSS (2) 2019: 275-284 - [c51]Songqian Li, Kun Ma, Xuewei Niu, Yufeng Wang, Ke Ji, Ziqiang Yu, Zhenxiang Chen:
Stacking-Based Ensemble Learning on Low Dimensional Features for Fake News Detection. HPCC/SmartCity/DSS 2019: 2730-2735 - [c50]Cong Liu, Zhenxiang Chen, Dong Cao, Mingyue Shang:
Application of Recommender System in Intelligent Community under Big Data Scenario. ICBDT 2019: 92-96 - [c49]Hao Li, Zhenxiang Chen, Riccardo Spolaor, Qiben Yan, Chuan Zhao, Bo Yang:
DART: Detecting Unseen Malware Variants using Adaptation Regularization Transfer Learning. ICC 2019: 1-6 - [c48]Jian Liu, Ke Ji, Runyuan Sun, Kun Ma, Zhenxiang Chen, Lin Wang:
Abnormal Phone Analysis Based on Learning to Rank and Ensemble Learning in Environment of Telecom Big Data. ICMLC 2019: 301-305 - [c47]Yahan Yuan, Ke Ji, Runyuan Sun, Kun Ma, Zhenxiang Chen, Lin Wang:
An Abnormal Phone Identification Model with Meta-learning Two-layer Framework Based on PCA Dimension Reduction. ICMLC 2019: 511-515 - [c46]Ying Pang, Zhenxiang Chen, Lizhi Peng, Kun Ma, Chuan Zhao, Ke Ji:
A Signature-Based Assistant Random Oversampling Method for Malware Detection. TrustCom/BigDataSE 2019: 256-263 - 2018
- [j15]Chuan Zhao, Shengnan Zhao, Bo Zhang, Zhongtian Jia, Zhenxiang Chen, Mauro Conti:
Secure Comparison Under Ideal/Real Simulation Paradigm. IEEE Access 6: 31236-31248 (2018) - [j14]Ke Ji, Zhenxiang Chen, Runyuan Sun, Kun Ma, Zhongjie Yuan, Guandong Xu:
GIST: A generative model with individual and subgroup-based topics for group recommendation. Expert Syst. Appl. 94: 81-93 (2018) - [j13]Zhenxiang Chen, Qiben Yan, Hongbo Han, Shanshan Wang, Lizhi Peng, Lin Wang, Bo Yang:
Machine learning based mobile malware detection using highly imbalanced network traffic. Inf. Sci. 433-434: 346-364 (2018) - [j12]Zhiquan Feng, Bo Yang, Tao Xu, Xiaohui Yang, We Xie, Changsheng Ai, Zhenxiang Chen:
FM: Flexible mapping from one gesture to multiple semantics. Inf. Sci. 467: 654-669 (2018) - [j11]Shanshan Wang, Qiben Yan, Zhenxiang Chen, Bo Yang, Chuan Zhao, Mauro Conti:
Detecting Android Malware Leveraging Text Semantics of Network Flows. IEEE Trans. Inf. Forensics Secur. 13(5): 1096-1109 (2018) - [c45]Mohannad Alhanahnah, Qicheng Lin, Qiben Yan, Ning Zhang, Zhenxiang Chen:
Efficient Signature Generation for Classifying Cross-Architecture IoT Malware. CNS 2018: 1-9 - [c44]Changwei Cai, Shuangrong Liu, Lin Wang, Bo Yang, Zhenxiang Chen, Jin Zhou:
Optimizing floating centroids method neural network classifier using dynamic multilayer particle swarm optimization. GECCO 2018: 394-401 - [c43]Xuehui Zhu, He Zhang, Lin Wang, Bo Yang, Jin Zhou, Zhenxiang Chen, Ajith Abraham:
Improving Nearest Neighbor Partitioning Neural Network Classifier Using Multi-layer Particle Swarm Optimization. HIS 2018: 360-369 - [c42]Yuxi Xie, Hanbo Deng, Lizhi Peng, Zhenxiang Chen:
Accurate Identification of Internet Video Traffic Using Byte Code Distribution Features. ICA3PP (1) 2018: 46-58 - [c41]Anran Liu, Zhenxiang Chen, Shanshan Wang, Lizhi Peng, Chuan Zhao, Yuliang Shi:
A Fast and Effective Detection of Mobile Malware Behavior Using Network Traffic. ICA3PP (4) 2018: 109-120 - [c40]Qun Li, Zhenxiang Chen, Qiben Yan, Shanshan Wang, Kun Ma, Yuliang Shi, Lizhen Cui:
MulAV: Multilevel and Explainable Detection of Android Malware with Data Fusion. ICA3PP (4) 2018: 166-177 - [c39]Yongzheng Lin, Hong Liu, Zhenxiang Chen, Kun Zhang, Kun Ma:
Adaptive Data Sampling Mechanism for Process Object. ICA3PP (1) 2018: 257-266 - [c38]Qi He, Zhenxiang Chen, Ke Ji, Lin Wang, Kun Ma, Chuan Zhao, Yuliang Shi:
Cluster Center Initialization and Outlier Detection Based on Distance and Density for the K-Means Algorithm. ISDA (1) 2018: 530-539 - [c37]Shanshan Wang, Zhenxiang Chen, Qiben Yan, Ke Ji, Lin Wang, Bo Yang, Mauro Conti:
Deep and Broad Learning Based Detection of Android Malware via Network Traffic. IWQoS 2018: 1-6 - [c36]Shanshan Wang, Qiben Yan, Zhenxiang Chen, Lin Wang, Riccardo Spolaor, Bo Yang, Mauro Conti:
Lexical Mining of Malicious URLs for Classifying Android Malware. SecureComm (1) 2018: 248-263 - [c35]Qi He, Zhenxiang Chen, Anli Yan, Lizhi Peng, Chuan Zhao, Yuliang Shi:
TrafficPSSF: A Fast and An Effective Malware Detection Under Online and Offline. SPAC 2018: 14-19 - [c34]Anli Yan, Zhenxiang Chen, Lin Wang, Lizhi Peng, Muhammad Umair Hassan, Chuan Zhao:
Neural Network Rule Extraction for Real Time Traffic Behavior Identification. SPAC 2018: 146-151 - [c33]Ke Ji, Yahan Yuan, Runyuan Sun, Kun Ma, Zhenxiang Chen, Jian Liu:
A Bagging-based ensemble method for recommendations under uncertain rating data. SPAC 2018: 446-450 - 2017
- [j10]Zhenxiang Chen, Zhusong Liu, Lizhi Peng