Folgen
Huashan Chen
Titel
Zitiert von
Zitiert von
Jahr
A survey on ethereum systems security: Vulnerabilities, attacks, and defenses
H Chen, M Pendleton, L Njilla, S Xu
ACM Computing Surveys (CSUR) 53 (3), 1-43, 2020
6262020
Statistical estimation of malware detection metrics in the absence of ground truth
P Du, Z Sun, H Chen, JH Cho, S Xu
IEEE Transactions on Information Forensics and Security 13 (12), 2965-2980, 2018
552018
Quantifying the security effectiveness of firewalls and dmzs
H Chen, JH Cho, S Xu
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the …, 2018
522018
Blockchain-based automated and robust cyber security management
S He, E Ficke, MMA Pritom, H Chen, Q Tang, Q Chen, M Pendleton, ...
Journal of Parallel and Distributed Computing 163, 62-82, 2022
332022
Quantifying the security effectiveness of network diversity: poster
H Chen, JH Cho, S Xu
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the …, 2018
252018
Theoretical convergence guaranteed resource-adaptive federated learning with mixed heterogeneity
Y Wang, X Zhang, M Li, T Lan, H Chen, H Xiong, X Cheng, D Yu
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and …, 2023
192023
Quantifying cybersecurity effectiveness of dynamic network diversity
H Chen, H Cam, S Xu
IEEE Transactions on Dependable and Secure Computing 19 (6), 3804-3821, 2021
182021
Optimizing interconnections to maximize the spectral radius of interdependent networks
H Chen, X Zhao, F Liu, S Xu, W Lu
Physical Review E 95 (3), 032308, 2017
102017
Stories behind decisions: Towards interpretable malware family classification with hierarchical attention
H Bao, W Li, H Chen, H Miao, Q Wang, Z Tang, F Liu, W Wang
Computers & Security 144, 103943, 2024
32024
Reordering and Compression for Hypergraph Processing
Y Liu, Q Luo, M Xiao, D Yu, H Chen, X Cheng
IEEE Transactions on Computers, 2024
22024
A Study of Code Clone on Open Source VR Software
W Huang, J Chen, H Chen, Z Qi, X Yang, K Peng, S He
Proceedings of the 39th IEEE/ACM International Conference on Automated …, 2024
12024
AST2Vec: A Robust Neural Code Representation for Malicious PowerShell Detection
H Miao, H Bao, Z Tang, W Li, W Wang, H Chen, F Liu, Y Sun
International Conference on Science of Cyber Security, 207-224, 2023
12023
Method and system for blockchain-based cyber security management
S Xu, HE Songlin, E Ficke, MMA Pritom, C Huashan, Q Tang, Q Chen, ...
US Patent App. 17/733,580, 2023
12023
Optimal strategy selection for attack graph games using deep reinforcement learning
Y Zhang, F Liu, H Chen
2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th …, 2022
12022
Optimal Strategy Selection for Cyber Deception via Deep Reinforcement Learning
Y Zhang, F Liu, H Chen
2022 IEEE Smartworld, Ubiquitous Intelligence & Computing, Scalable …, 2022
12022
Unveiling Code Clone Patterns in Open Source VR Software: An Empirical Study
H Chen, Z Huang, Y Xu, W Huang, J Chen, H Li, K Peng, F Liu, S He
arXiv preprint arXiv:2501.07165, 2025
2025
DynamicLip: Shape-Independent Continuous Authentication via Lip Articulator Dynamics
H Chen, Y Xu, Y Feng, M Jian, F Liu, P Hu, K Peng, S He, Z Wang
arXiv preprint arXiv:2501.01032, 2025
2025
LAA-Net: A Physical-prior-knowledge Based Network for Robust Nighttime Depth Estimation
K Peng, H Li, Z Qi, H Chen, Z Wang, W Zhang, S He
arXiv preprint arXiv:2412.04666, 2024
2024
Rethinking Robust Multivariate Time Series Anomaly Detection: A Hierarchical Spatio-Temporal Variational Perspective
X Zhang, S Xu, H Chen, Z Chen, F Zhuang, H Xiong, D Yu
IEEE Transactions on Knowledge and Data Engineering, 2024
2024
Optimal Defense Strategy for Multi-agents Using Value Decomposition Networks
W Cai, H Chen, H Chen, F Liu
International Conference on Intelligent Computing, 504-516, 2024
2024
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20