Enhancing cloud-based IoT security through trustworthy cloud service: An integration of security and reputation approach X Li, Q Wang, X Lan, X Chen, N Zhang, D Chen IEEE access 7, 9368-9383, 2019 | 146 | 2019 |
Review on the application of deep learning in network attack detection T Yi, X Chen, Y Zhu, W Ge, Z Han Journal of Network and Computer Applications 212, 103580, 2023 | 74 | 2023 |
BTCAS: A blockchain-based thoroughly cross-domain authentication scheme H Zhang, X Chen, X Lan, H Jin, Q Cao Journal of Information Security and Applications 55, 102538, 2020 | 57 | 2020 |
A focused crawler based on naive bayes classifier W Wang, X Chen, Y Zou, H Wang, Z Dai 2010 Third International Symposium on Intelligent Information Technology and …, 2010 | 56 | 2010 |
Interlayer link prediction in multiplex social networks: an iterative degree penalty algorithm R Tang, S Jiang, X Chen, H Wang, W Wang, W Wang Knowledge-Based Systems 194, 105598, 2020 | 48 | 2020 |
Containerguard: A real-time attack detection system in container-based big data platform Y Wang, Q Wang, X Chen, D Chen, X Fang, M Yin, N Zhang IEEE Transactions on Industrial Informatics 18 (5), 3327-3336, 2020 | 40 | 2020 |
End-to-end attack on text-based CAPTCHAs based on cycle-consistent generative adversarial network C Li, X Chen, H Wang, P Wang, Y Zhang, W Wang Neurocomputing 433, 223-236, 2021 | 38 | 2021 |
Flow context and host behavior based shadowsocks’s traffic identification X Zeng, X Chen, G Shao, T He, Z Han, Y Wen, Q Wang IEEE Access 7, 41017-41032, 2019 | 37 | 2019 |
An anomalous behavior detection model in cloud computing X Ye, X Chen, H Wang, X Zeng, G Shao, X Yin, C Xu Tsinghua Science and Technology 21 (3), 322-332, 2016 | 35 | 2016 |
DGA-based botnet detection toward imbalanced multiclass learning Y Chen, B Pang, G Shao, G Wen, X Chen Tsinghua Science and Technology 26 (4), 387-402, 2021 | 34 | 2021 |
An Internet Traffic Identification Approach Based on GA and PSO-SVM. J Tan, X Chen, M Du J. Comput. 7 (1), 19-29, 2012 | 33 | 2012 |
Interlayer link prediction in multiplex social networks based on multiple types of consistency between embedding vectors R Tang, Z Miao, S Jiang, X Chen, H Wang, W Wang IEEE Transactions on Cybernetics 53 (4), 2426-2439, 2021 | 32 | 2021 |
Spatial and temporal analysis on public opinion evolution of epidemic situation about novel coronavirus pneumonia based on micro blog data 陈兴蜀, 常天祐, 王海舟, 赵志龙, 张杰 Journal of Sichuan University (Natural Science Edition) 57 (2), 409-416, 2020 | 32 | 2020 |
Contrastive learning enhanced intrusion detection Y Yue, X Chen, Z Han, X Zeng, Y Zhu IEEE Transactions on Network and Service Management 19 (4), 4232-4247, 2022 | 29 | 2022 |
Enhancing trustworthiness of Internet of Vehicles in space–air–ground-integrated networks: Attestation approach Q Wang, X Chen, X Jin, X Li, D Chen, X Qin IEEE Internet of Things Journal 9 (8), 5992-6002, 2021 | 27 | 2021 |
Prompt packer: Deceiving llms through compositional instruction with hidden attacks S Jiang, X Chen, R Tang arXiv preprint arXiv:2310.10077, 2023 | 26 | 2023 |
Containing misinformation spreading in temporal social networks W Wang, Y Ma, T Wu, Y Dai, X Chen, LA Braunstein Chaos: An Interdisciplinary Journal of Nonlinear Science 29 (12), 2019 | 24 | 2019 |
Online Internet traffic identification algorithm based on multistage classifier D Min, C Xingshu, T Jun China Communications 10 (2), 89-97, 2013 | 21 | 2013 |
Cloud virtual machine lifecycle security framework based on trusted computing X Jin, Q Wang, X Li, X Chen, W Wang Tsinghua Science and Technology 24 (5), 520-534, 2019 | 20 | 2019 |
Interlayer link prediction based on multiple network structural attributes R Tang, X Chen, C Wei, Q Li, W Wang, H Wang, W Wang Computer Networks 203, 108651, 2022 | 19 | 2022 |