Folgen
Jianhai Chen
Jianhai Chen
Bestätigte E-Mail-Adresse bei zju.edu.cn
Titel
Zitiert von
Zitiert von
Jahr
Live migration of multiple virtual machines with resource reservation in cloud computing environments
K Ye, X Jiang, D Huang, J Chen, B Wang
2011 IEEE 4th International Conference on Cloud Computing, 267-274, 2011
2382011
Behavior pattern clustering in blockchain networks
B Huang, Z Liu, J Chen, A Liu, Q Liu, Q He
Multimedia Tools and Applications 76, 20099-20110, 2017
1142017
V-fuzz: Vulnerability-oriented evolutionary fuzzing
Y Li, S Ji, C Lv, Y Chen, J Chen, Q Gu, C Wu
arXiv preprint arXiv:1901.01142, 2019
722019
Fedrecattack: Model poisoning attack to federated recommendation
D Rong, S Ye, R Zhao, HN Yuen, J Chen, Q He
2022 IEEE 38th International Conference on Data Engineering (ICDE), 2643-2655, 2022
692022
Non-cooperative games on multidimensional resource allocation
D Ye, J Chen
Future Generation Computer Systems 29 (6), 1345-1352, 2013
652013
Adversarial captchas
C Shi, X Xu, S Ji, K Bu, J Chen, R Beyah, T Wang
IEEE transactions on cybernetics 52 (7), 6095-6108, 2021
632021
Smartseed: Smart seed generation for efficient fuzzing
C Lyu, S Ji, Y Li, J Zhou, J Chen, J Chen
arXiv preprint arXiv:1807.02606, 2018
582018
V-fuzz: Vulnerability prediction-assisted evolutionary fuzzing for binary programs
Y Li, S Ji, C Lyu, Y Chen, J Chen, Q Gu, C Wu, R Beyah
IEEE transactions on cybernetics 52 (5), 3745-3756, 2020
512020
Virt-LM: a benchmark for live migration of virtual machine
D Huang, D Ye, Q He, J Chen, K Ye
Proceedings of the 2nd ACM/SPEC International Conference on Performance …, 2011
492011
AAGA: Affinity-aware grouping for allocation of virtual machines
J Chen, K Chiew, D Ye, L Zhu, W Chen
2013 IEEE 27th International Conference on Advanced Information Networking …, 2013
462013
Poisoning deep learning based recommender model in federated learning scenarios
D Rong, Q He, J Chen
arXiv preprint arXiv:2204.13594, 2022
452022
Towards understanding the security of modern image captchas and underground captcha-solving services
H Weng, B Zhao, S Ji, J Chen, T Wang, Q He, R Beyah
Big Data Mining and Analytics 2 (2), 118-144, 2019
422019
Towards evaluating the security of real-world deployed image captchas
B Zhao, H Weng, S Ji, J Chen, T Wang, Q He, R Beyah
Proceedings of the 11th acm workshop on artificial intelligence and security …, 2018
402018
De-sag: On the de-anonymization of structure-attribute graph data
S Ji, T Wang, J Chen, W Li, P Mittal, R Beyah
IEEE Transactions on Dependable and Secure Computing 16 (4), 594-607, 2017
302017
Informed live migration strategies of virtual machines for cluster load balancing
X Li, Q He, J Chen, K Ye, T Yin
IFIP International Conference on Network and Parallel Computing, 111-122, 2011
262011
Rapido: Scaling blockchain with multi-path payment channels
C Lin, N Ma, X Wang, J Chen
Neurocomputing 406, 322-332, 2020
232020
Cats: cross-platform e-commerce fraud detection
H Weng, S Ji, F Duan, Z Li, J Chen, Q He, T Wang
2019 ieee 35th international conference on data engineering (icde), 1874-1885, 2019
232019
Detecting missed security operations through differential checking of object-based similar paths
D Liu, Q Wu, S Ji, K Lu, Z Liu, J Chen, Q He
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
182021
Digital resource rights confirmation and infringement tracking based on smart contracts
P Qian, Z Liu, X Wang, J Chen, B Wang, R Zimmermann
2019 IEEE 6th International Conference on Cloud Computing and Intelligence …, 2019
182019
Joint affinity aware grouping and virtual machine placement
J Chen, Q He, D Ye, W Chen, Y Xiang, K Chiew, L Zhu
Microprocessors and Microsystems 52, 365-380, 2017
172017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20