Enhancing cloud-based IoT security through trustworthy cloud service: An integration of security and reputation approach X Li, Q Wang, X Lan, X Chen, N Zhang, D Chen IEEE access 7, 9368-9383, 2019 | 146 | 2019 |
Review on the application of deep learning in network attack detection T Yi, X Chen, Y Zhu, W Ge, Z Han Journal of Network and Computer Applications 212, 103580, 2023 | 74 | 2023 |
BTCAS: A blockchain-based thoroughly cross-domain authentication scheme H Zhang, X Chen, X Lan, H Jin, Q Cao Journal of Information Security and Applications 55, 102538, 2020 | 57 | 2020 |
A focused crawler based on naive bayes classifier W Wang, X Chen, Y Zou, H Wang, Z Dai 2010 Third International Symposium on Intelligent Information Technology and …, 2010 | 56 | 2010 |
Interlayer link prediction in multiplex social networks: an iterative degree penalty algorithm R Tang, S Jiang, X Chen, H Wang, W Wang, W Wang Knowledge-Based Systems 194, 105598, 2020 | 47 | 2020 |
Containerguard: A real-time attack detection system in container-based big data platform Y Wang, Q Wang, X Chen, D Chen, X Fang, M Yin, N Zhang IEEE Transactions on Industrial Informatics 18 (5), 3327-3336, 2020 | 40 | 2020 |
End-to-end attack on text-based CAPTCHAs based on cycle-consistent generative adversarial network C Li, X Chen, H Wang, P Wang, Y Zhang, W Wang Neurocomputing 433, 223-236, 2021 | 39 | 2021 |
Flow context and host behavior based shadowsocks’s traffic identification X Zeng, X Chen, G Shao, T He, Z Han, Y Wen, Q Wang IEEE Access 7, 41017-41032, 2019 | 38 | 2019 |
An anomalous behavior detection model in cloud computing X Ye, X Chen, H Wang, X Zeng, G Shao, X Yin, C Xu Tsinghua Science and Technology 21 (3), 322-332, 2016 | 36 | 2016 |
DGA-based botnet detection toward imbalanced multiclass learning Y Chen, B Pang, G Shao, G Wen, X Chen Tsinghua Science and Technology 26 (4), 387-402, 2021 | 32 | 2021 |
Spatial and temporal analysis on public opinion evolution of epidemic situation about novel coronavirus pneumonia based on micro blog data 陈兴蜀, 常天祐, 王海舟, 赵志龙, 张杰 Journal of Sichuan University (Natural Science Edition) 57 (2), 409-416, 2020 | 32 | 2020 |
Interlayer link prediction in multiplex social networks based on multiple types of consistency between embedding vectors R Tang, Z Miao, S Jiang, X Chen, H Wang, W Wang IEEE Transactions on Cybernetics 53 (4), 2426-2439, 2021 | 31 | 2021 |
An Internet Traffic Identification Approach Based on GA and PSO-SVM. J Tan, X Chen, M Du J. Comput. 7 (1), 19-29, 2012 | 27 | 2012 |
Enhancing trustworthiness of Internet of Vehicles in space–air–ground-integrated networks: Attestation approach Q Wang, X Chen, X Jin, X Li, D Chen, X Qin IEEE Internet of Things Journal 9 (8), 5992-6002, 2021 | 26 | 2021 |
Contrastive learning enhanced intrusion detection Y Yue, X Chen, Z Han, X Zeng, Y Zhu IEEE Transactions on Network and Service Management 19 (4), 4232-4247, 2022 | 25 | 2022 |
Containing misinformation spreading in temporal social networks W Wang, Y Ma, T Wu, Y Dai, X Chen, LA Braunstein Chaos: An Interdisciplinary Journal of Nonlinear Science 29 (12), 2019 | 24 | 2019 |
Prompt packer: Deceiving llms through compositional instruction with hidden attacks S Jiang, X Chen, R Tang arXiv preprint arXiv:2310.10077, 2023 | 23 | 2023 |
Cloud virtual machine lifecycle security framework based on trusted computing X Jin, Q Wang, X Li, X Chen, W Wang Tsinghua Science and Technology 24 (5), 520-534, 2019 | 23 | 2019 |
IDEA: A utility-enhanced approach to incomplete data stream anonymization L Yang, X Chen, Y Luo, X Lan, W Wang Tsinghua Science and Technology 27 (1), 127-140, 2021 | 20 | 2021 |
Accelerated k-nearest neighbors algorithm based on principal component analysis for text categorization M Du, X Chen Journal of Zhejiang University SCIENCE C 14 (6), 407-416, 2013 | 20 | 2013 |