Secure multi-party computation: theory, practice and applications C Zhao, S Zhao, M Zhao, Z Chen, CZ Gao, H Li, Y Tan
Information Sciences 476, 357-372, 2019
453 2019 Machine learning based mobile malware detection using highly imbalanced network traffic Z Chen, Q Yan, H Han, S Wang, L Peng, L Wang, B Yang
Information Sciences 433, 346-364, 2018
209 2018 A high-accuracy, real-time, intelligent material perception system with a machine-learning-motivated pressure-sensitive electronic skin X Wei, H Li, W Yue, S Gao, Z Chen, Y Li, G Shen
Matter 5 (5), 1481-1501, 2022
168 2022 Healthchain: A novel framework on privacy preservation of electronic health records using blockchain technology S Chenthara, K Ahmed, H Wang, F Whittaker, Z Chen
Plos one 15 (12), e0243043, 2020
167 2020 Detecting android malware leveraging text semantics of network flows S Wang, Q Yan, Z Chen, B Yang, C Zhao, M Conti
IEEE Transactions on Information Forensics and Security 13 (5), 1096-1109, 2017
167 2017 A mobile malware detection method using behavior features in network traffic S Wang, Z Chen, Q Yan, B Yang, L Peng, Z Jia
Journal of Network and Computer Applications 133, 15-25, 2019
150 2019 Using linguistic features to estimate suicide probability of Chinese microblog users L Zhang, X Huang, T Liu, A Li, Z Chen, T Zhu
Human Centered Computing: First International Conference, HCC 2014, Phnom …, 2015
110 2015 Gaussian distribution based oversampling for imbalanced data classification Y Xie, M Qiu, H Zhang, L Peng, Z Chen
IEEE Transactions on Knowledge and Data Engineering 34 (2), 667-679, 2020
106 2020 Efficient signature generation for classifying cross-architecture IoT malware M Alhanahnah, Q Lin, Q Yan, N Zhang, Z Chen
2018 IEEE conference on communications and network security (CNS), 1-9, 2018
102 2018 Sn3O4/rGO heterostructure as a material for formaldehyde gas sensor with a wide detecting range and low operating temperature F Yin, Y Li, W Yue, S Gao, C Zhang, Z Chen
Sensors and Actuators B: Chemical 312, 127954, 2020
100 2020 Trafficav: An effective and explainable detection of mobile malware behavior using network traffic S Wang, Z Chen, L Zhang, Q Yan, B Yang, L Peng, Z Jia
2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS), 1-6, 2016
89 2016 Traffic classification using probabilistic neural networks R Sun, B Yang, L Peng, Z Chen, L Zhang, S Jing
2010 Sixth International Conference on Natural Computation 4, 1914-1919, 2010
75 2010 Ranking-based biased learning swarm optimizer for large-scale optimization H Deng, L Peng, H Zhang, B Yang, Z Chen
Information Sciences 493, 120-137, 2019
68 2019 Deep and broad URL feature mining for android malware detection S Wang, Z Chen, Q Yan, K Ji, L Peng, B Yang, M Conti
Information Sciences 513, 600-613, 2020
65 2020 RC-chain: Reputation-based crowdsourcing blockchain for vehicular networks L Sun, Q Yang, X Chen, Z Chen
Journal of network and computer applications 176, 102956, 2021
60 2021 Effectiveness of statistical features for early stage internet traffic identification L Peng, B Yang, Y Chen, Z Chen
International Journal of Parallel Programming 44, 181-197, 2016
57 2016 Droidclassifier: Efficient adaptive mining of application-layer header for classifying android malware Z Li, L Sun, Q Yan, W Srisa-an, Z Chen
Security and Privacy in Communication Networks: 12th International …, 2017
50 2017 Online hybrid traffic classifier for Peer-to-Peer systems based on network processors Z Chen, B Yang, Y Chen, A Abraham, C Grosan, L Peng
Applied Soft Computing 9 (2), 685-694, 2009
47 2009 : Privacy‐preserving collaborative deep learning against leakage from gradient sharingQ Zhao, C Zhao, S Cui, S Jing, Z Chen
International Journal of Intelligent Systems 35 (8), 1262-1279, 2020
45 2020 DC-CNN: Dual-channel Convolutional Neural Networks with attention-pooling for fake news detection K Ma, C Tang, W Zhang, B Cui, K Ji, Z Chen, A Abraham
Applied Intelligence 53 (7), 8354-8369, 2023
43 2023