default search action
Xingshu Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j54]Qindong Li, Wenyi Tang, Xingshu Chen, Song Feng, Lizhi Wang:
Comprehensive vulnerability aspect extraction. Appl. Intell. 54(3): 2881-2899 (2024) - [j53]Yao Li, Xingshu Chen, Wenyi Tang, Yi Zhu, Zhenhui Han, Yawei Yue:
Interaction matters: Encrypted traffic classification via status-based interactive behavior graph. Appl. Soft Comput. 155: 111423 (2024) - [j52]Tao Yi, Xingshu Chen, Qindong Li, Yi Zhu:
An anomaly behavior characterization method of network traffic based on Spatial Pyramid Pool (SPP). Comput. Secur. 141: 103809 (2024) - [j51]Zhenwu Xu, Xingshu Chen, Xiao Lan, Rui Tang, Shuyu Jiang, Changxiang Shen:
Empowering Data Owners: An Efficient and Verifiable Scheme for Secure Data Deletion. Comput. Secur. 144: 103978 (2024) - [j50]Chenglong Ren, Xiao Lan, Xingshu Chen, Yonggang Luo, Shuhua Ruan:
A novel framework for Chinese personal sensitive information detection. Connect. Sci. 36(1) (2024) - [j49]Liang Ke, Peng Xiao, Xinyu Chen, Shui Yu, Xingshu Chen, Haizhou Wang:
A novel cross-domain adaptation framework for unsupervised criminal jargon detection via pre-trained contextual embedding of darknet corpus. Expert Syst. Appl. 242: 122715 (2024) - [j48]Xinyu Chen, Yifei Jian, Liang Ke, Yunxiang Qiu, Xingshu Chen, Yunya Song, Haizhou Wang:
A deep semantic-aware approach for Cantonese rumor detection in social networks with graph convolutional network. Expert Syst. Appl. 245: 123007 (2024) - [j47]Tao Zheng, Yunxiang Qiu, Yundan Zheng, Qixu Wang, Xingshu Chen:
Enhancing TinyML-Based Container Escape Detectors With Systemcall Semantic Association in UAVs Networks. IEEE Internet Things J. 11(12): 21158-21169 (2024) - [j46]Yao Li, Xingshu Chen, Wenyi Tang, Bingyu Chen:
A green computing method for encrypted IoT traffic recognition based on traffic fingerprint graphs. Peer Peer Netw. Appl. 17(3): 1514-1526 (2024) - [j45]Zhenxiong Miao, Xingshu Chen, Haizhou Wang, Rui Tang, Zhou Yang, Tiemai Huang, Wenyi Tang:
Detecting Offensive Language Based on Graph Attention Networks and Fusion Features. IEEE Trans. Comput. Soc. Syst. 11(1): 1493-1505 (2024) - [j44]Yicheng Cai, Haizhou Wang, Hao Cao, Wenxian Wang, Lei Zhang, Xingshu Chen:
Detecting Spam Movie Review Under Coordinated Attack With Multi-View Explicit and Implicit Relations Semantics Fusion. IEEE Trans. Inf. Forensics Secur. 19: 7588-7603 (2024) - 2023
- [j43]Xiao Lan, Jing Xu, Zhenfeng Zhang, Xingshu Chen, Yonggang Luo:
A systematic security analysis of EMV protocol. Comput. Stand. Interfaces 84: 103700 (2023) - [j42]Xinyu Chen, Haizhou Wang, Liang Ke, Zhipeng Lu, Hanjian Su, Xingshu Chen:
Identifying Cantonese rumors with discriminative feature integration in online social networks. Expert Syst. Appl. 215: 119347 (2023) - [j41]Min Yang, Xingshu Chen, Liuyan Tan, Xiao Lan, Yonggang Luo:
Listen carefully to experts when you classify data: A generic data classification ontology encoded from regulations. Inf. Process. Manag. 60(2): 103186 (2023) - [j40]Min Yang, Liuyan Tan, Xingshu Chen, Yonggang Luo, Zhenwu Xu, Xiao Lan:
Laws and Regulations tell how to classify your data: A case study on higher education. Inf. Process. Manag. 60(3): 103240 (2023) - [j39]Haizhou Wang, Yixuan Fang, Shuyu Jiang, Xingshu Chen, Xiaohui Peng, Wenxian Wang:
Unveiling Qzone: A measurement study of a large-scale online social network. Inf. Sci. 623: 146-163 (2023) - [j38]Tao Yi, Xingshu Chen, Yi Zhu, Weijing Ge, Zhenhui Han:
Review on the application of deep learning in network attack detection. J. Netw. Comput. Appl. 212: 103580 (2023) - [j37]Yulong Wang, Qixu Wang, Xue Qin, Xingshu Chen, Bangzhou Xin, Run Yang:
DockerWatch: a two-phase hybrid detection of malware using various static features in container cloud. Soft Comput. 27(2): 1015-1031 (2023) - [j36]Rui Tang, Zhenxiong Miao, Shuyu Jiang, Xingshu Chen, Haizhou Wang, Wei Wang:
Interlayer Link Prediction in Multiplex Social Networks Based on Multiple Types of Consistency Between Embedding Vectors. IEEE Trans. Cybern. 53(4): 2426-2439 (2023) - [c14]Jiale Chen, Xingshu Chen, Liangguo Chen, Xiao Lan, Yonggang Luo:
ANTI: An Adaptive Network Traffic Indexing Algorithm for High-Speed Networks. GLOBECOM 2023: 1699-1704 - [c13]Shuyu Jiang, Dengbiao Tu, Xingshu Chen, Rui Tang, Wenxian Wang, Haizhou Wang:
DKCS: A Dual Knowledge-Enhanced Abstractive Cross-Lingual Summarization Method Based on Graph Attention Networks. ICONIP (13) 2023: 109-121 - [i12]Shuyu Jiang, Wenyi Tang, Xingshu Chen, Rui Tang, Haizhou Wang, Wenxian Wang:
RAUCG: Retrieval-Augmented Unsupervised Counter Narrative Generation for Hate Speech. CoRR abs/2310.05650 (2023) - [i11]Shuyu Jiang, Xingshu Chen, Rui Tang:
Prompt Packer: Deceiving LLMs through Compositional Instruction with Hidden Attacks. CoRR abs/2310.10077 (2023) - 2022
- [j35]Rui Tang, Xingshu Chen, Chuancheng Wei, Qindong Li, Wenxian Wang, Haizhou Wang, Wei Wang:
Interlayer link prediction based on multiple network structural attributes. Comput. Networks 203: 108651 (2022) - [j34]Qixu Wang, Xingshu Chen, Xin Jin, Xiang Li, Dajiang Chen, Xue Qin:
Enhancing Trustworthiness of Internet of Vehicles in Space-Air-Ground-Integrated Networks: Attestation Approach. IEEE Internet Things J. 9(8): 5992-6002 (2022) - [j33]Rui Tang, Shuyu Jiang, Xingshu Chen, Wenxian Wang, Wei Wang:
Network structural perturbation against interlayer link prediction. Knowl. Based Syst. 250: 109095 (2022) - [j32]Yulong Wang, Qixu Wang, Xingshu Chen, Dajiang Chen, Xiaojie Fang, Mingyong Yin, Ning Zhang:
ContainerGuard: A Real-Time Attack Detection System in Container-Based Big Data Platform. IEEE Trans. Ind. Informatics 18(5): 3327-3336 (2022) - [j31]Yawei Yue, Xingshu Chen, Zhenhui Han, Xuemei Zeng, Yi Zhu:
Contrastive Learning Enhanced Intrusion Detection. IEEE Trans. Netw. Serv. Manag. 19(4): 4232-4247 (2022) - [c12]Mingxing Zhou, Shuhua Ruan, Junwei Liu, Xingshu Chen, Miaomiao Yang, Qixu Wang:
vTPM-SM: An Application Scheme of SM2/SM3/SM4 Algorithms Based on Trusted Computing in Cloud Environment. CLOUD 2022: 351-356 - [c11]Yifei Jian, Xingshu Chen, Haizhou Wang:
Fake Restaurant Review Detection Using Deep Neural Networks with Hybrid Feature Fusion Method. DASFAA (3) 2022: 133-148 - [c10]Xu Guo, Tao Zheng, Xingshu Chen, Qixu Wang, Jiang Shao, Zhijie Hu:
ApkClassiFy: Identification and Classification of packed Android Malicious Applications. GLOBECOM 2022: 2092-2097 - [c9]Dengzhe Wang, Xingshu Chen, Qixu Wang, Shengkai Wang, Feiyu Xu, Tao Zheng:
Autoscaling cracker: an efficient asymmetric DDoS attack on serverless functions. GLOBECOM 2022: 4179-4184 - [c8]Yulong Wang, Xingshu Chen, Qixu Wang, Run Yang, Bangzhou Xin:
Unsupervised Anomaly Detection for Container Cloud Via BILSTM-Based Variational Auto-Encoder. ICASSP 2022: 3024-3028 - [c7]Yanshuang Gui, Miaomiao Yang, Haishuang Yan, Yayun Guo, Qixu Wang, Xingshu Chen:
MURAS: An Efficient Multi-Value-Proof-Based Remote Attestation Scheme for Cloud Platform. ICCNS 2022: 98-104 - [i10]Zhenxiong Miao, Xingshu Chen, Haizhou Wang, Rui Tang, Zhou Yang, Wenyi Tang:
Detecting Offensive Language on Social Networks: An End-to-end Detection Method based on Graph Attention Networks. CoRR abs/2203.02123 (2022) - [i9]Shuyu Jiang, Dengbiao Tu, Xingshu Chen, Rui Tang, Wenxian Wang, Haizhou Wang:
ClueGraphSum: Let Key Clues Guide the Cross-Lingual Abstractive Summarization. CoRR abs/2203.02797 (2022) - [i8]Rui Tang, Shuyu Jiang, Xingshu Chen, Wenxian Wang, Wei Wang:
Network structural perturbation against interlayer link prediction. CoRR abs/2205.09079 (2022) - [i7]Yulong Wang, Xingshu Chen, Qixu Wang:
Privacy-preserving Security Inference Towards Cloud-Edge Collaborative Using Differential Privacy. CoRR abs/2212.06428 (2022) - 2021
- [j30]Chunhui Li, Xingshu Chen, Haizhou Wang, Peiming Wang, Yu Zhang, Wenxian Wang:
End-to-end attack on text-based CAPTCHAs based on cycle-consistent generative adversarial network. Neurocomputing 433: 223-236 (2021) - [j29]Lina Wang, Xingshu Chen, Rui Tang, Yawei Yue, Yi Zhu, Xuemei Zeng, Wei Wang:
Improving adversarial robustness of deep neural networks by using semantic information. Knowl. Based Syst. 226: 107141 (2021) - [j28]Wenjing Zeng, Rui Tang, Haizhou Wang, Xingshu Chen, Wenxian Wang:
User Identification Based on Integrating Multiple User Information across Online Social Networks. Secur. Commun. Networks 2021: 5533417:1-5533417:14 (2021) - [j27]Lu Yang, Xingshu Chen, Yonggang Luo, Xiao Lan, Li Chen:
PurExt: Automated Extraction of the Purpose-Aware Rule from the Natural Language Privacy Policy in IoT. Secur. Commun. Networks 2021: 5552501:1-5552501:11 (2021) - [j26]Hongjian Jin, Xingshu Chen, Xiao Lan, Hui Guo, Hongxia Zhang, Qi Cao:
Corrigendum to "BNRDT: When Data Transmission Meets Blockchain". Secur. Commun. Networks 2021: 9814372:1-9814372:1 (2021) - [i6]Lina Wang, Xingshu Chen, Yulong Wang, Yawei Yue, Yi Zhu, Xuemei Zeng, Wei Wang:
Analyzing Adversarial Robustness of Deep Neural Networks in Pixel Space: a Semantic Perspective. CoRR abs/2106.09872 (2021) - 2020
- [j25]Xiaoyan Wang, Xingshu Chen, Yitong Wang, Long Ge:
An efficient scheme for SDN state consistency verification in cloud computing environment. Concurr. Comput. Pract. Exp. 32(2) (2020) - [j24]Hongxia Zhang, Xingshu Chen, Xiao Lan, Hongjian Jin, Qi Cao:
BTCAS: A Blockchain-Based Thoroughly Cross-Domain Authentication Scheme. J. Inf. Secur. Appl. 55: 102538 (2020) - [j23]Rui Tang, Shuyu Jiang, Xingshu Chen, Haizhou Wang, Wenxian Wang, Wei Wang:
Interlayer link prediction in multiplex social networks: An iterative degree penalty algorithm. Knowl. Based Syst. 194: 105598 (2020) - [j22]Xue-yuan Yin, Xingshu Chen, Lin Chen, Hui Li:
Extension of Research on Security as a Service for VMs in IaaS Platform. Secur. Commun. Networks 2020: 8538519:1-8538519:16 (2020) - [j21]Hongjian Jin, Xingshu Chen, Xiao Lan, Hui Guo, Hongxia Zhang, Qi Cao:
BNRDT: When Data Transmission Meets Blockchain. Secur. Commun. Networks 2020: 8828984:1-8828984:16 (2020) - [j20]Min Yang, Xingshu Chen, Yonggang Luo, Hang Zhang:
An Android Malware Detection Model Based on DT-SVM. Secur. Commun. Networks 2020: 8841233:1-8841233:11 (2020) - [j19]Guo-lin Shao, Xingshu Chen, Xuemei Zeng, Lina Wang:
Deep Learning Hierarchical Representation From Heterogeneous Flow-Level Communication Data. IEEE Trans. Inf. Forensics Secur. 15: 1525-1540 (2020) - [i5]Rui Tang, Shuyu Jiang, Xingshu Chen, Haizhou Wang, Wenxian Wang, Wei Wang:
Interlayer link prediction in multiplex social networks: an iterative degree penalty algorithm. CoRR abs/2002.02140 (2020) - [i4]Rui Tang, Zhenxiong Miao, Shuyu Jiang, Xingshu Chen, Haizhou Wang, Wenxian Wang, Mingyong Yin, Wei Wang:
Interlayer Link Prediction in Multiplex Social Networks Based on Multiple Types of Consistency between Embedding Vectors. CoRR abs/2008.05212 (2020) - [i3]Lina Wang, Rui Tang, Yawei Yue, Xingshu Chen, Wei Wang, Yi Zhu, Xuemei Zeng:
Improving adversarial robustness of deep neural networks by using semantic information. CoRR abs/2008.07838 (2020) - [i2]Chunhui Li, Xingshu Chen, Haizhou Wang, Yu Zhang, Peiming Wang:
An End-to-End Attack on Text-based CAPTCHAs Based on Cycle-Consistent Generative Adversarial Network. CoRR abs/2008.11603 (2020)
2010 – 2019
- 2019
- [j18]Xiang Li, Qixu Wang, Xiao Lan, Xingshu Chen, Ning Zhang, Dajiang Chen:
Enhancing Cloud-Based IoT Security Through Trustworthy Cloud Service: An Integration of Security and Reputation Approach. IEEE Access 7: 9368-9383 (2019) - [j17]Xuemei Zeng, Xingshu Chen, Guo-lin Shao, Tao He, Zhenhui Han, Yi Wen, Qixu Wang:
Flow Context and Host Behavior Based Shadowsocks's Traffic Identification. IEEE Access 7: 41017-41032 (2019) - [j16]Mingyong Yin, Xingshu Chen, Haizhou Wang, Qixu Wang, Chenxi Ma, Xue Qin:
An Automatic Event Detection Method for Massive Wireless Access Prediction. IEEE Access 7: 113404-113416 (2019) - [j15]Zhenhui Han, Xingshu Chen, Xuemei Zeng, Yi Zhu, Mingyong Yin:
Detecting Proxy User Based on Communication Behavior Portrait. Comput. J. 62(12): 1777-1792 (2019) - [j14]Mingyong Yin, Xingshu Chen, Qixu Wang, Wei Wang, Yulong Wang:
Dynamics on Hybrid Complex Network: Botnet Modeling and Analysis of Medical IoT. Secur. Commun. Networks 2019: 6803801:1-6803801:14 (2019) - [i1]Wei Wang, Yuanhui Ma, Tao Wu, Yang Dai, Xingshu Chen, Lidia A. Braunstein:
Containing misinformation spreading in temporal social networks. CoRR abs/1904.10801 (2019) - 2018
- [j13]Xue-yuan Yin, Xingshu Chen, Lin Chen, Guo-lin Shao, Hui Li, Shusong Tao:
Research of Security as a Service for VMs in IaaS Platform. IEEE Access 6: 29158-29172 (2018) - [j12]Haizhou Wang, Xingshu Chen, Wenxian Wang, Mei Ya Chan:
Content pollution propagation in the overlay network of peer-to-peer live streaming systems: modelling and analysis. IET Commun. 12(17): 2119-2131 (2018) - [j11]Xiang Li, Xin Jin, Qixu Wang, Mingsheng Cao, Xingshu Chen:
SCCAF: A Secure and Compliant Continuous Assessment Framework in Cloud-Based IoT Context. Wirel. Commun. Mob. Comput. 2018: 3078272:1-3078272:18 (2018) - 2017
- [j10]Guo-lin Shao, Xingshu Chen, Lu Yang:
Research and implementation of a high performance parallel computing digital down converter on graphics processing unit. Concurr. Comput. Pract. Exp. 29(8) (2017) - [j9]Haizhou Wang, Xingshu Chen, Wenxian Wang, Mei Ya Chan:
Exploring the accuracy of capturing snapshots in large-scale P2P IPTV systems. Int. J. Commun. Syst. 30(1) (2017) - 2016
- [j8]Guo-lin Shao, Xingshu Chen, Xue-yuan Yin, Xiaoming Ye:
A fuzzy detection approach toward different speed port scan attacks based on Dempster-Shafer evidence theory. Secur. Commun. Networks 9(15): 2627-2640 (2016) - 2014
- [j7]Min Du, Xingshu Chen, Jun Tan:
An efficient method of P2P traffic identification based on wavelet packet decomposition and kernel principal component analysis. Int. J. Commun. Syst. 27(10): 1476-1490 (2014) - [j6]Xiaosong Wu, Xingshu Chen, Haizhou Wang:
An Effective Scheme for Performance Improvement of P2P Live Streaming Systems. J. Networks 9(4): 1067-1073 (2014) - 2013
- [j5]Cheng Wang, Xingshu Chen, Wenxian Wang:
A Video Sharing Site Oriented Data Collection System. J. Softw. 8(12): 3007-3015 (2013) - [j4]Min Du, Xingshu Chen:
Accelerated k-nearest neighbors algorithm based on principal component analysis for text categorization. J. Zhejiang Univ. Sci. C 14(6): 407-416 (2013) - [c6]Wenxian Wang, Xingshu Chen, Haizhou Wang:
A resources monitoring architecture for P2P file-sharing systems. ICDIP 2013: 88783T - 2012
- [j3]Jun Tan, Xingshu Chen, Min Du:
An Internet Traffic Identification Approach Based on GA and PSO-SVM. J. Comput. 7(1): 19-29 (2012) - [j2]Jian Wang, Xingshu Chen, Dengqi Yang:
An Improved Adaptive Routing Algorithm Based on Link Analysis. J. Networks 7(1): 135-140 (2012) - [j1]Wenxian Wang, Xingshu Chen, Haizhou Wang:
IPTV-RM: A Resources Monitoring Architecture for P2P IPTV Systems. J. Networks 7(10): 1624-1630 (2012) - 2010
- [c5]Wenxian Wang, Xingshu Chen, Yongbin Zou, Haizhou Wang, Zongkun Dai:
A Focused Crawler Based on Naive Bayes Classifier. IITSI 2010: 517-521 - [c4]Jun Tan, Xingshu Chen, Min Du:
A Novel P2P Identification Algorithm Based on Genetic Algorithm and Particle Swarm Optimization. PAAP 2010: 22-29 - [p1]Shaojie Qiao, Changjie Tang, Huidong Jin, Shucheng Dai, Xingshu Chen, Michael Chau, Jian Hu:
Processing Constrained k-Closest Pairs Queries in Crime Databases. Security Informatics 2010: 59-75
2000 – 2009
- 2008
- [c3]Jun Tan, Xingshu Chen, Long Xiao:
An Optimized Parallel FFT Algorithm on Multiprocessors with Cache Technology in Linux. ISCSCT (2) 2008: 105-109 - [c2]Lei Zhang, Xingshu Chen, Bo Xu:
A Reliable Distributed Process Management System. ISCSCT (2) 2008: 724-728 - [c1]Shaojie Qiao, Changjie Tang, Huidong Jin, Shucheng Dai, Xingshu Chen:
Constrained k-closest pairs query processing based on growing window in crime databases. ISI 2008: 58-63
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 21:40 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint