Secure olsr F Hong, L Hong, C Fu 19th International Conference on Advanced Information Networking and …, 2005 | 96 | 2005 |
Codee: A tensor embedding scheme for binary code search J Yang, C Fu, XY Liu, H Yin, P Zhou IEEE Transactions on Software Engineering 48 (7), 2224-2244, 2021 | 49 | 2021 |
Resource allocation for delay-sensitive vehicle-to-multi-edges (V2Es) communications in vehicular networks: A multi-agent deep reinforcement learning approach J Wu, J Wang, Q Chen, Z Yuan, P Zhou, X Wang, C Fu IEEE Transactions on Network Science and Engineering 8 (2), 1873-1886, 2021 | 43 | 2021 |
GRAP: Grey risk assessment based on projection in ad hoc networks C Fu, X Gao, M Liu, X Liu, L Han, J Chen Journal of Parallel and Distributed Computing 71 (9), 1249-1260, 2011 | 33 | 2011 |
Reinforcement learning-based black-box evasion attacks to link prediction in dynamic graphs H Fan, B Wang, P Zhou, A Li, Z Xu, C Fu, H Li, Y Chen 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th …, 2021 | 22 | 2021 |
Intrusion detection system for IoT heterogeneous perceptual network M Zhou, L Han, H Lu, C Fu Mobile networks and applications 26, 1461-1474, 2021 | 22 | 2021 |
Wormhole: The Hidden Virus Propagation Power of a Search Engine in Social Networks C Fu, XY Liu, J Yang, LT Yang, S Yu, T Zhu IEEE Transactions on Dependable and Secure Computing, 2017 | 21 | 2017 |
VDoTR: Vulnerability detection based on tensor representation of comprehensive code graphs Y Fan, C Wan, C Fu, L Han, H Xu Computers & Security 130, 103247, 2023 | 16 | 2023 |
Function-level obfuscation detection method based on graph convolutional networks S Jiang, Y Hong, C Fu, Y Qian, L Han Journal of Information Security and Applications 61, 102953, 2021 | 15 | 2021 |
Search engine: The social relationship driving power of Internet of Things C Fu, C Peng, XY Liu, LT Yang, J Yang, L Han Future Generation Computer Systems 92, 972-986, 2019 | 15 | 2019 |
A hybrid game model based on reputation for spectrum allocation in wireless networks J Chen, S Lian, C Fu, R Du Computer Communications 33 (14), 1623-1631, 2010 | 15 | 2010 |
Deep learning-based reverse method of binary protocol C Yang, C Fu, Y Qian, Y Hong, G Feng, L Han Security and Privacy in Digital Economy: First International Conference …, 2020 | 14 | 2020 |
Secure tensor decomposition for heterogeneous multimedia data in cloud computing C Fu, Z Yang, XY Liu, J Yang, A Walid, LT Yang IEEE Transactions on Computational Social Systems 7 (1), 247-260, 2020 | 12 | 2020 |
Grey theory based reputation system for secure neighbor discovery in wireless ad hoc networks L Hong, W Chen, L Gao, G Zhang, C Fu 2010 2nd International Conference on Future Computer and Communication 2, V2 …, 2010 | 12 | 2010 |
The impact of the collective influence of search engines on social networks D Kong, C Fu, J Yang, D Xu, L Han IEEE Access 5, 24920-24930, 2017 | 11 | 2017 |
Virtualization of the encryption card for trust access in cloud computing D Xu, C Fu, G Li, D Zou, H Zhang, XY Liu IEEE Access 5, 20652-20667, 2017 | 11 | 2017 |
Task-based behavior detection of illegal codes L Han, C Fu, D Zou, CH Lee, W Jia Mathematical and computer modelling 55 (1-2), 80-86, 2012 | 11 | 2012 |
Malicious code detection model based on behavior association L Han, M Qian, X Xu, C Fu, H Kwisaba Tsinghua Science and Technology 19 (5), 508-515, 2014 | 10 | 2014 |
Grey theory based nodes risk assessment in p2p networks F Cai, T Fugui, C Yongquan, L Ming, P Bing 2009 IEEE International Symposium on Parallel and Distributed Processing …, 2009 | 10 | 2009 |
Defending against wormhole attack in OLSR H Liang, H Fan, F Cai Geo-Spatial Information Science 9 (3), 229-233, 2006 | 10 | 2006 |