


default search action
Chen Zhong 0008
Person information
- affiliation: University of Tampa, Tampa, FL, USA
Other persons with the same name
- Chen Zhong — disambiguation page
- Chen Zhong 0001
— Nanjing University, Nanjing, China - Chen Zhong 0002
— University of Texas at Arlington, TX, USA - Chen Zhong 0003
— University College London, London, UK - Chen Zhong 0004
— Johannes Kepler University Linz, Linz, Austria - Chen Zhong 0005
— Hainan University, China - Chen Zhong 0006
— Wuhan University, Wuhan, China - Chen Zhong 0007
— Syracuse University, Syracuse, NY, USA - Chen Zhong 0009
— Didi Chuxing, Beijing, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j8]J. B. (Joo Baek) Kim, Chen Zhong, Hong Liu:
The Impact of Gamification on Cybersecurity Learning: Multi-Study Analysis. Commun. Assoc. Inf. Syst. 56: 6 (2025)
[j7]Chen Zhong
, John Oruongo
, J. B. (Joo Baek) Kim
:
LLM-Powered Low-Code/No-Code Data Analytics in Education and Workforce Development. Computer 58(3): 49-59 (2025)- 2024
[j6]Chen Zhong
, J. B. (Joo Baek) Kim
, Hong Liu
:
The Art of Inclusive Gamification in Cybersecurity Training. IEEE Secur. Priv. 22(5): 40-51 (2024)
[c16]Chen Zhong
, Sam Zaza
, Valerie L. Bartelt
:
Understanding Communication Preferences in Collaborative Cybersecurity Incident Response. SIGMIS-CPR 2024: 25:1
[c15]Chang Yue, Chen Zhong, Kai Chen, Zhiyu Zhang, Yeonjoon Lee:
DARKFLEECE: Probing the Dark Side of Android Subscription Apps. USENIX Security Symposium 2024- 2023
[j5]Chen Zhong
, J. B. (Joo Baek) Kim
, Ali Alper Yayla
:
Enhancing Communication Among Remote Cybersecurity Analysts With Visual Traces. IT Prof. 25(5): 29-36 (2023)
[c14]Ed Marcavage, Jake Mason, Chen Zhong
:
Predicting the Effectiveness of Blockchain Bug Bounty Programs. FLAIRS 2023- 2022
[c13]Chen Zhong, J. B. (Joo Baek) Kim, Hong Liu:
The Impact of Gamification on Students' Learning Outcome and Career Interest in Cybersecurity Education. AMCIS 2022- 2021
[j4]Hong Liu, Chen Zhong
, Awny Alnusair
, Sheikh Rabiul Islam:
FAIXID: A Framework for Enhancing AI Explainability of Intrusion Detection Results Using Data Cleaning Techniques. J. Netw. Syst. Manag. 29(4): 40 (2021)
[c12]Brock Floyd, Jared Jackson, Emma Probst, Hong Liu, Nischal Mishra, Chen Zhong:
Understanding Learners' Interests in Cybersecurity Competitions on Reddit. ICETC 2021: 444-449- 2020
[c11]Joshua Ian Bertrand, Alex Martakis, Hong Liu, Chen Zhong
, Jun Yao:
Exploring Participants' Views of Cybersecurity Competitions through the Lens of Social Media. CogSIMA 2020: 155-162
[p3]Chen Zhong
, John Yen, Peng Liu:
Can Cyber Operations Be Made Autonomous? An Answer from the Situational Awareness Viewpoint. Adaptive Autonomous Secure Cyber Systems 2020: 63-88
2010 – 2019
- 2019
[j3]Chen Zhong
, John Yen, Peng Liu
, Robert F. Erbacher:
Learning From Experts' Experience: Toward Automated Cyber Security Data Triage. IEEE Syst. J. 13(1): 603-614 (2019)
[c10]Chen Zhong
, Awny Alnusair, Brandon Sayger, Aaron Troxell, Jun Yao:
AOH-Map: A Mind Mapping System for Supporting Collaborative Cyber Security Analysis. CogSIMA 2019: 74-80
[c9]Lindsey Thomas, Moises Balders, Zach Countney, Chen Zhong
, Jun Yao, Chunxia Xu:
Cybersecurity Education: From Beginners to Advanced Players in Cybersecurity Competitions. ISI 2019: 149-151- 2018
[j2]Chen Zhong
, Tao Lin, Peng Liu, John Yen, Kai Chen:
A cyber security data triage operation retrieval system. Comput. Secur. 76: 12-31 (2018)
[c8]Tao Lin, Chen Zhong, John Yen, Peng Liu:
Retrieval of Relevant Historical Data Triage Operations in Security Operation Centers. From Database to Cyber Security 2018: 227-243
[c7]Hong Liu, Chen Zhong:
Assessing programming education approaches for college beginners with different backgrounds. ICETC 2018: 136-139
[c6]Lindsey Thomas, Adam Vaughan, Zachary Courtney, Chen Zhong
, Awny Alnusair:
Supporting Collaboration Among Cyber Security Analysts Through Visualizing Their Analytical Reasoning Processes. ICME Workshops 2018: 1-6- 2017
[j1]Awny Alnusair, Chen Zhong
, Majdi Rawashdeh, M. Shamim Hossain, Atif Alamri:
Context-aware multimodal recommendations of multimedia data in cyber situational awareness. Multim. Tools Appl. 76(21): 22823-22843 (2017)
[p2]Chen Zhong
, John Yen, Peng Liu, Robert F. Erbacher, Christopher Garneau, Bo Chen:
Studying Analysts' Data Triage Operations in Cyber Defense Situational Analysis. Theory and Models for Cyber Situation Awareness 2017: 128-169- 2016
[c5]Chen Zhong
, John Yen, Peng Liu, Robert F. Erbacher:
Automate Cybersecurity Data Triage by Leveraging Human Analysts' Cognitive Process. BigDataSecurity/HPSC/IDS 2016: 357-363- 2015
[c4]Chen Zhong
, John Yen, Peng Liu, Rob Erbacher, Renee Etoty, Christopher Garneau:
ARSCA: a computer tool for tracing the cognitive processes of cyber-attack analysis. CogSIMA 2015: 165-171
[c3]Chen Zhong
, John Yen, Peng Liu, Rob Erbacher, Renee Etoty, Christopher Garneau:
An integrated computer-aided cognitive task analysis method for tracing cyber-attack analysis processes. HotSoS 2015: 9:1-9:11- 2014
[c2]Chen Zhong
, Deepak Samuel, John Yen, Peng Liu, Robert F. Erbacher, Steve E. Hutchinson, Renee Etoty, Hasan Cam, William Glodek:
RankAOH: Context-driven similarity-based retrieval of experiences in cyber analysis. CogSIMA 2014: 230-236
[p1]John Yen, Robert F. Erbacher, Chen Zhong
, Peng Liu:
Cognitive Process. Cyber Defense and Situational Awareness 2014: 119-144- 2013
[c1]Chen Zhong
, Deepak S. Kirubakaran, John Yen, Peng Liu, Steve E. Hutchinson, Hasan Cam:
How to use experience in cyber analysis: An analytical reasoning support system. ISI 2013: 263-265
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-10-22 04:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







