default search action
Hongsong Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Nasir Ahmad Jalali, Hongsong Chen:
Comprehensive framework for implementing blockchain-enabled federated learning and full homomorphic encryption for chatbot security system. Clust. Comput. 27(8): 10859-10882 (2024) - [j27]Hongsong Chen, Xingyu Li, Wenmao Liu:
Multivariate time series anomaly detection by fusion of deep convolution residual autoencoding reconstruction model and ConvLstm forecasting model. Comput. Secur. 137: 103581 (2024) - [j26]Hongsong Chen, Yiying Zhang, Xintong Han, Yongrui Cao, Yongpeng Zhang:
Blockchain-as-a-Service for the Security Challenges and Solutions in the Internet of Things Environment. Wirel. Pers. Commun. 136(4): 2299-2327 (2024) - 2023
- [j25]Hongsong Chen, Shi Lei, Yiying Zhang, Xintong Han, Yongrui Cao, Yongpeng Zhang:
Blockchain-based internet of things security architecture and applications. J. Ambient Intell. Humaniz. Comput. 14(12): 16703-16714 (2023) - [j24]Nasir Ahmad Jalali, Hongsong Chen:
Security Issues and Solutions in Federate Learning Under IoT Critical Infrastructure. Wirel. Pers. Commun. 129(1): 475-500 (2023) - [c7]Ghazi Mergani Ali, Hongsong Chen:
Power of Fuzzing and Machine Learning in Smart Contract Security Validation. FSDM 2023: 788-796 - 2021
- [j23]Hongsong Chen, Caixia Meng, Jingjiu Chen:
DDoS Attack Simulation and Machine Learning-Based Detection Approach in Internet of Things Experimental Environment. Int. J. Inf. Secur. Priv. 15(3): 1-18 (2021) - [j22]Hongsong Chen, Yongpeng Zhang, Yongrui Cao, Bharat K. Bhargava:
Security Threats and Defensive Approaches in Machine Learning System Under Big Data Environment. Wirel. Pers. Commun. 117(4): 3505-3525 (2021) - 2020
- [j21]Aaron Zimba, Hongsong Chen, Zhaoshun Wang, Mumbi Chishimba:
Modeling and detection of the multi-stages of Advanced Persistent Threats attacks based on semi-supervised learning and complex networks characteristics. Future Gener. Comput. Syst. 106: 501-517 (2020) - [j20]Hongsong Chen, Caixia Meng, Zhongchuan Fu, Chao-Hsien Lee:
Novel LDoS attack detection by Spark-assisted correlation analysis approach in wireless sensor network. IET Inf. Secur. 14(4): 452-458 (2020)
2010 – 2019
- 2019
- [j19]Hongsong Chen, Caixia Meng, Zhiguang Shan, Zhongchuan Fu, Bharat K. Bhargava:
A Novel Low-Rate Denial of Service Attack Detection Approach in ZigBee Wireless Sensor Network by Combining Hilbert-Huang Transformation and Trust Evaluation. IEEE Access 7: 32853-32866 (2019) - [j18]Hongsong Chen, Haiyan Zhuang, Zhiguang Shan, Chao-Hsien Lee, Zhongchuan Fu:
A novel SMP-based survivability evaluation metric and approach in wireless sensor network. Comput. Sci. Inf. Syst. 16(3): 733-751 (2019) - [j17]Aaron Zimba, Hongsong Chen, Zhaoshun Wang:
Bayesian network based weighted APT attack paths modeling in cloud computing. Future Gener. Comput. Syst. 96: 525-537 (2019) - [j16]Hongsong Chen, Zhongchuan Fu, Gang Wang:
A novel HHT and KS statistic approach to detect RoQ attack in wireless sensor network. Int. J. Embed. Syst. 11(5): 643-652 (2019) - [j15]Aaron Zimba, Zhaoshun Wang, Hongsong Chen, Mwenge Mulenga:
Recent Advances in Cryptovirology: State-of-the-Art Crypto Mining and Crypto Ransomware Attacks. KSII Trans. Internet Inf. Syst. 13(6): 3258-3279 (2019) - [j14]Xiong Zhan, Hao Guo, Xiaoyun He, Zhoubin Liu, Xuejie Sun, Hongsong Chen:
国家电网边缘计算信息系统安全风险评估方法研究 (Research on Security Risk Assessment Method of State Grid Edge Computing Information System). 计算机科学 46(11A): 428-432 (2019) - [j13]Hongsong Chen, Ming Liu, Zhongchuan Fu:
Using Improved Hilbert-Huang Transformation Method to Detect Routing-Layer Reduce of Quality Attack in Wireless Sensor Network. Wirel. Pers. Commun. 104(2): 595-615 (2019) - 2018
- [j12]Aaron Zimba, Zhaoshun Wang, Hongsong Chen:
Multi-stage crypto ransomware attacks: A new emerging cyber threat to critical infrastructure and industrial control systems. ICT Express 4(1): 14-18 (2018) - [j11]Aaron Zimba, Hongsong Chen, Zhaoshun Wang:
Bayesian-Boolean Logic Security Assessment Model for Malware-Free Intrusions. Int. J. Netw. Secur. 20(3): 558-567 (2018) - [j10]Bi-ying Zhang, Zhongchuan Fu, Hongsong Chen, Gang Cui:
TCSTM: A task-characteristic-considered steady-state thermal model of multicore processors. Microprocess. Microsystems 60: 162-172 (2018) - [j9]Fadi Farha, Hongsong Chen:
Mitigating replay attacks with ZigBee solutions. Netw. Secur. 2018(1): 13-19 (2018) - 2017
- [c6]Aaron Zimba, Zhaoshun Wang, Hongsong Chen:
Reasoning crypto ransomware infection vectors with Bayesian networks. ISI 2017: 149-151 - 2016
- [j8]Hongsong Chen, Gang Wang, Zhongchuan Fu:
基于分段模型检测的云服务跨域认证协议的形式化分析与验证 (Cloud Services Cross-domain Authentication Protocol Formal Analysis and Verification Based on Fragment Model Check). 计算机科学 43(4): 140-144 (2016) - 2015
- [j7]Hongsong Chen, Zhongchuan Fu:
Hadoop-Based Healthcare Information System Design and Wireless Security Communication Implementation. Mob. Inf. Syst. 2015: 852173:1-852173:9 (2015) - [c5]Hongsong Chen, Zhi Han, Zhongchuan Fu:
Quantitative Trustworthy Evaluation Scheme for Trust Routing Scheme in Wireless Sensor Networks. TrustCom/BigDataSE/ISPA (1) 2015: 1272-1278 - [c4]Hongsong Chen, Xiaomei Wang:
Design and Implementation of Cloud Server Remote Management System Based on IMPI Protocol. UIC/ATC/ScalCom 2015: 1475-1478 - 2014
- [j6]Hongsong Chen, Bharat K. Bhargava, Zhongchuan Fu:
Multilabels-Based Scalable Access Control for Big Data Applications. IEEE Cloud Comput. 1(3): 65-71 (2014) - 2013
- [j5]Hongsong Chen:
Networks, Crowds, and Markets: Reasoning about a Highly Connected World [Book Review]. IEEE Technol. Soc. Mag. 32(3): 10 (2013) - 2011
- [j4]Hongsong Chen, Zhongchuan Fu:
A Novel Trust Routing Scheme Based on Node Behaviour Evaluation for Mobile AD Hoc Networks. Intell. Autom. Soft Comput. 17(8): 1063-1074 (2011) - 2010
- [c3]Chao Wang, Zhongchuan Fu, Hongsong Chen, Wei Ba, Bin Li, Lin Chen, Zexu Zhang, Yuying Wang, Gang Cui:
CFCSS without Aliasing for SPARC Architecture. CIT 2010: 2094-2100 - [c2]Xiaoming Lu, Weihua Cao, Xusheng Huang, Feiyi Huang, Liwen He, Wenhong Yang, Shaobin Wang, Xiaotong Zhang, Hongsong Chen:
A Real Implementation of DPI in 3G Network. GLOBECOM 2010: 1-5
2000 – 2009
- 2007
- [j3]Hongsong Chen, Zhongchuan Fu, Chengyao Wang, Zhenzhou Ji, Mingzeng Hu:
Using network processor to establish security agent for AODV routing protocol. J. Comput. Inf. Technol. 15(1): 61-70 (2007) - [j2]Hongsong Chen, Zhenzhou Ji, Mingzeng Hu, Zhongchuan Fu, Ruixiang Jiang:
Design and performance evaluation of a multi-agent-based dynamic lifetime security scheme for AODV routing protocol. J. Netw. Comput. Appl. 30(1): 145-166 (2007) - [j1]Hongsong Chen, Zhaoshun Wang, Guangping Zeng, Hongwei Liu:
Using Network Processor to Establish Trustworthy Agent Scheme for AODV Routing Protocol. Wirel. Pers. Commun. 42(1): 49-62 (2007) - 2003
- [c1]Hongsong Chen, Zhenzhou Ji, Mingzeng Hu:
Orthogonal Design Method for Optimal Cache Configuration. APPT 2003: 172-176
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-26 01:52 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint