


Остановите войну!
for scientists:
Zhenxiang Chen
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j33]Shuangrong Liu, Lin Wang
, Bo Yang, Jin Zhou
, Zhenxiang Chen
, Huifen Dong:
Improvement of Neural-Network Classifiers Using Fuzzy Floating Centroids. IEEE Trans. Cybern. 52(3): 1392-1404 (2022) - [j32]Yuxi Xie, Min Qiu, Haibo Zhang
, Lizhi Peng
, Zhenxiang Chen
:
Gaussian Distribution Based Oversampling for Imbalanced Data Classification. IEEE Trans. Knowl. Data Eng. 34(2): 667-679 (2022) - [c68]Nasimul Hasan, Zhenxiang Chen, Chuan Zhao, Yuhui Zhu, Cong Liu:
IoT Botnet Detection framework from Network Behavior based on Extreme Learning Machine. INFOCOM Workshops 2022: 1-6 - [i4]Yuhui Zhu, Zhenxiang Chen, Qiben Yan, Shanshan Wang, Enlong Li, Lizhi Peng, Chuan Zhao:
Mining Function Homology of Bot Loaders from Honeypot Logs. CoRR abs/2206.00385 (2022) - 2021
- [j31]Yong-Feng Ge
, Jinli Cao, Hua Wang
, Zhenxiang Chen, Yanchun Zhang:
Set-Based Adaptive Distributed Differential Evolution for Anonymity-Driven Database Fragmentation. Data Sci. Eng. 6(4): 380-391 (2021) - [j30]Zhihao Hou, Kun Ma
, Yufeng Wang, Jia Yu, Ke Ji, Zhenxiang Chen, Ajith Abraham:
Attention-based learning of self-media data for marketing intention detection. Eng. Appl. Artif. Intell. 98: 104118 (2021) - [j29]Anli Yan, Zhenxiang Chen, Haibo Zhang, Lizhi Peng, Qiben Yan, Muhammad Umair Hassan, Chuan Zhao, Bo Yang:
Effective detection of mobile malware behavior based on explainable deep neural network. Neurocomputing 453: 482-492 (2021) - [j28]Lijun Sun
, Qian Yang
, Xiao Chen
, Zhenxiang Chen:
RC-chain: Reputation-based crowdsourcing blockchain for vehicular networks. J. Netw. Comput. Appl. 176: 102956 (2021) - [c67]Qian Zhang, Shan Jing, Chuan Zhao, Bo Zhang, Zhenxiang Chen:
Efficient Federated Learning Framework Based on Multi-Key Homomorphic Encryption. 3PGCIC 2021: 88-105 - [c66]Hanchen Xu, Zhenxiang Chen, Shanshan Wang, Xiaoqing Jiang:
Chinese NER Using ALBERT and Multi-word Information. ACM TUR-C 2021: 141-145 - [c65]Nobukazu Yoshioka, Jati H. Husen, Hnin Thandar Tun, Zhenxiang Chen, Hironori Washizaki, Yoshiaki Fukazawa:
Landscape of Requirements Engineering for Machine Learning-based AI Systems. APSEC Workshops 2021: 5-8 - [c64]Zhenxiang Chen, Wangwang Yu, Haohan Bai, Yong Li:
An Arcloss-Based and Openset-Test-Oriented Finger Vein Recognition System. CCBR 2021: 287-294 - [c63]Hao Li, Shanqing Guo, Peng Tang, Chengyu Hu, Zhenxiang Chen:
TranFuzz: An Ensemble Black-Box Attack Framework Based on Domain Adaptation and Fuzzing. ICICS (1) 2021: 260-275 - [c62]Cong Liu, Anli Yan, Zhenxiang Chen, Haibo Zhang, Qiben Yan, Lizhi Peng, Chuan Zhao:
IEdroid: Detecting Malicious Android Network Behavior Using Incremental Ensemble of Ensembles. ICPADS 2021: 788-795 - [c61]Gang Zhang, Hao Li, Zhenxiang Chen, Lizhi Peng, Yuhui Zhu, Chuan Zhao:
AndroCreme: Unseen Android Malware Detection Based on Inductive Conformal Learning. TrustCom 2021: 651-658 - [c60]Yanqi Li, Ke Ji, Kun Ma, Zhenxiang Chen, Jun Wu, Yidong Li, Guandong Xu:
HACK: A Hierarchical Model for Fake News Detection. WISE (1) 2021: 565-572 - [c59]Xiaoqi Lv, Ke Ji, Zhenxiang Chen, Kun Ma, Jun Wu, Yidong Li, Guandong Xu:
Expert Recommendations with Temporal Dynamics of User Interest in CQA. WISE (1) 2021: 645-652 - 2020
- [j27]Ravinder Singh
, Sudha Subramani
, Jiahua Du, Yanchun Zhang
, Hua Wang
, Khandakar Ahmed
, Zhenxiang Chen
:
Deep Learning for Multi-Class Antisocial Behavior Identification From Twitter. IEEE Access 8: 194027-194044 (2020) - [j26]Jifeng Guo
, Meihui Li, Lin Wang, Bo Yang, Liangliang Zhang, Zhenxiang Chen, Shi-Yuan Han, Laura García-Hernandez
, Ajith Abraham:
Estimating cement compressive strength using three-dimensional microstructure images and deep belief network. Eng. Appl. Artif. Intell. 88 (2020) - [j25]Yufeng Wang, Kun Ma
, Laura García-Hernández
, Jing Chen, Zhihao Hou, Ke Ji, Zhenxiang Chen, Ajith Abraham:
A CLSTM-TMN for marketing intention detection. Eng. Appl. Artif. Intell. 91: 103595 (2020) - [j24]Qi Zhao, Chuan Zhao, Shujie Cui, Shan Jing, Zhenxiang Chen:
PrivateDL PrivateDL : Privacy-preserving collaborative deep learning against leakage from gradient sharing. Int. J. Intell. Syst. 35(8): 1262-1279 (2020) - [j23]Shanshan Wang, Zhenxiang Chen, Qiben Yan
, Ke Ji, Lizhi Peng, Bo Yang, Mauro Conti
:
Deep and broad URL feature mining for android malware detection. Inf. Sci. 513: 600-613 (2020) - [j22]Chuan Zhao
, Shengnan Zhao
, Bo Zhang, Shan Jing, Zhenxiang Chen, Minghao Zhao:
Oblivious DFA evaluation on joint input and its applications. Inf. Sci. 528: 168-180 (2020) - [j21]Anqi Teng, Lizhi Peng
, Yuxi Xie, Haibo Zhang, Zhenxiang Chen:
Gradient descent evolved imbalanced data gravitation classification with an application on Internet video traffic identification. Inf. Sci. 539: 447-460 (2020) - [c58]Zhenxiang Chen, Hironori Washizaki, Yoshiaki Fukazawa:
Automated Tool for Revising Masking MC/DC Test Suite. ISSRE Workshops 2020: 157-158 - [c57]Anli Yan, Zhenxiang Chen, Riccardo Spolaor, Shuaishuai Tan, Chuan Zhao, Lizhi Peng, Bo Yang:
Network-based Malware Detection with a Two-tier Architecture for Online Incremental Update. IWQoS 2020: 1-10 - [c56]Yong-Feng Ge, Jinli Cao, Hua Wang, Yanchun Zhang, Zhenxiang Chen:
Distributed Differential Evolution for Anonymity-Driven Vertical Fragmentation in Outsourced Data Storage. WISE (2) 2020: 213-226 - [i3]Lijun Sun, Qian Yang, Xiao Chen, Zhenxiang Chen:
RC-chain: Reputation-based Crowdsourcing Blockchain for Vehicular Networks. CoRR abs/2012.11120 (2020)
2010 – 2019
- 2019
- [j20]Yuxi Xie, Lizhi Peng
, Zhenxiang Chen, Bo Yang, Hongli Zhang, Haibo Zhang:
Generative learning for imbalanced data using the Gaussian mixed model. Appl. Soft Comput. 79: 439-451 (2019) - [j19]Chuan Zhao
, Shengnan Zhao
, Minghao Zhao, Zhenxiang Chen, Chong-Zhi Gao, Hongwei Li, Yu-an Tan
:
Secure Multi-Party Computation: Theory, practice and applications. Inf. Sci. 476: 357-372 (2019) - [j18]Ying Pang, Lizhi Peng
, Zhenxiang Chen, Bo Yang, Hongli Zhang:
Imbalanced learning based on adaptive weighting and Gaussian function synthesizing with an application on Android malware detection. Inf. Sci. 484: 95-112 (2019) - [j17]Hanbo Deng, Lizhi Peng
, Haibo Zhang, Bo Yang, Zhenxiang Chen:
Ranking-based biased learning swarm optimizer for large-scale optimization. Inf. Sci. 493: 120-137 (2019) - [j16]Shanshan Wang, Zhenxiang Chen, Qiben Yan
, Bo Yang, Lizhi Peng, Zhongtian Jia:
A mobile malware detection method using behavior features in network traffic. J. Netw. Comput. Appl. 133: 15-25 (2019) - [c55]Ke Ji, Yahan Yuan, Kun Ma
, Runyuan Sun, Zhenxiang Chen, Jun Wu:
Context-aware recommendations via a tree-based ensemble framework. ACM TUR-C 2019: 50:1-50:5 - [c54]Ke Ji, Yahan Yuan, Ruanyuan Sun, Lin Wang, Kun Ma
, Zhenxiang Chen:
Abnormal telephone identification via an ensemble-based classification framework. ACM TUR-C 2019: 63:1-63:6 - [c53]Yahan Yuan, Ke Ji, Runyuan Sun, Kun Ma
, Zhenxiang Chen, Lin Wang:
An Integration Method Of Classifiers For Abnormal Phone Detection. BESC 2019: 1-6 - [c52]Anqi Teng, Lizhi Peng, Yuxi Xie, Haibo Zhang, Zhenxiang Chen:
Imbalanced Data Gravitation Classification Model Using For Internet Video Traffic Identification. BigDataSecurity/HPSC/IDS 2019: 172-177 - [c51]Chuan Zhao, Shengnan Zhao, Bo Zhang, Shan Jing, Zhenxiang Chen, Minghao Zhao:
Towards Secure Computation of Similar Patient Query on Genomic Data Under Multiple Keys. CSS (2) 2019: 275-284 - [c50]Songqian Li
, Kun Ma
, Xuewei Niu, Yufeng Wang, Ke Ji, Ziqiang Yu, Zhenxiang Chen:
Stacking-Based Ensemble Learning on Low Dimensional Features for Fake News Detection. HPCC/SmartCity/DSS 2019: 2730-2735 - [c49]Hao Li, Zhenxiang Chen, Riccardo Spolaor, Qiben Yan
, Chuan Zhao, Bo Yang:
DART: Detecting Unseen Malware Variants using Adaptation Regularization Transfer Learning. ICC 2019: 1-6 - [c48]Jian Liu, Ke Ji, Runyuan Sun, Kun Ma
, Zhenxiang Chen, Lin Wang:
Abnormal Phone Analysis Based on Learning to Rank and Ensemble Learning in Environment of Telecom Big Data. ICMLC 2019: 301-305 - [c47]Yahan Yuan, Ke Ji, Runyuan Sun, Kun Ma
, Zhenxiang Chen, Lin Wang:
An Abnormal Phone Identification Model with Meta-learning Two-layer Framework Based on PCA Dimension Reduction. ICMLC 2019: 511-515 - [c46]Ying Pang, Zhenxiang Chen, Lizhi Peng, Kun Ma
, Chuan Zhao, Ke Ji:
A Signature-Based Assistant Random Oversampling Method for Malware Detection. TrustCom/BigDataSE 2019: 256-263 - 2018
- [j15]Chuan Zhao
, Shengnan Zhao
, Bo Zhang, Zhongtian Jia, Zhenxiang Chen, Mauro Conti:
Secure Comparison Under Ideal/Real Simulation Paradigm. IEEE Access 6: 31236-31248 (2018) - [j14]Ke Ji, Zhenxiang Chen, Runyuan Sun, Kun Ma
, Zhongjie Yuan, Guandong Xu:
GIST: A generative model with individual and subgroup-based topics for group recommendation. Expert Syst. Appl. 94: 81-93 (2018) - [j13]Zhenxiang Chen, Qiben Yan
, Hongbo Han, Shanshan Wang, Lizhi Peng, Lin Wang, Bo Yang:
Machine learning based mobile malware detection using highly imbalanced network traffic. Inf. Sci. 433-434: 346-364 (2018) - [j12]Zhiquan Feng, Bo Yang, Tao Xu, Xiaohui Yang, We Xie, Changsheng Ai, Zhenxiang Chen:
FM: Flexible mapping from one gesture to multiple semantics. Inf. Sci. 467: 654-669 (2018) - [j11]Shanshan Wang, Qiben Yan
, Zhenxiang Chen
, Bo Yang
, Chuan Zhao, Mauro Conti
:
Detecting Android Malware Leveraging Text Semantics of Network Flows. IEEE Trans. Inf. Forensics Secur. 13(5): 1096-1109 (2018) - [c45]Mohannad Alhanahnah, Qicheng Lin, Qiben Yan
, Ning Zhang, Zhenxiang Chen:
Efficient Signature Generation for Classifying Cross-Architecture IoT Malware. CNS 2018: 1-9 - [c44]Changwei Cai, Shuangrong Liu, Lin Wang, Bo Yang, Zhenxiang Chen, Jin Zhou:
Optimizing floating centroids method neural network classifier using dynamic multilayer particle swarm optimization. GECCO 2018: 394-401 - [c43]Xuehui Zhu, He Zhang, Lin Wang, Bo Yang, Jin Zhou, Zhenxiang Chen, Ajith Abraham:
Improving Nearest Neighbor Partitioning Neural Network Classifier Using Multi-layer Particle Swarm Optimization. HIS 2018: 360-369 - [c42]Yuxi Xie, Hanbo Deng, Lizhi Peng, Zhenxiang Chen:
Accurate Identification of Internet Video Traffic Using Byte Code Distribution Features. ICA3PP (1) 2018: 46-58 - [c41]Anran Liu, Zhenxiang Chen, Shanshan Wang, Lizhi Peng, Chuan Zhao, Yuliang Shi:
A Fast and Effective Detection of Mobile Malware Behavior Using Network Traffic. ICA3PP (4) 2018: 109-120 - [c40]Qun Li, Zhenxiang Chen, Qiben Yan
, Shanshan Wang, Kun Ma
, Yuliang Shi, Lizhen Cui:
MulAV: Multilevel and Explainable Detection of Android Malware with Data Fusion. ICA3PP (4) 2018: 166-177 - [c39]Yongzheng Lin, Hong Liu, Zhenxiang Chen, Kun Zhang, Kun Ma
:
Adaptive Data Sampling Mechanism for Process Object. ICA3PP (1) 2018: 257-266 - [c38]Qi He, Zhenxiang Chen, Ke Ji, Lin Wang, Kun Ma
, Chuan Zhao, Yuliang Shi:
Cluster Center Initialization and Outlier Detection Based on Distance and Density for the K-Means Algorithm. ISDA (1) 2018: 530-539 - [c37]Shanshan Wang, Zhenxiang Chen, Qiben Yan
, Ke Ji, Lin Wang, Bo Yang, Mauro Conti:
Deep and Broad Learning Based Detection of Android Malware via Network Traffic. IWQoS 2018: 1-6 - [c36]Shanshan Wang, Qiben Yan
, Zhenxiang Chen, Lin Wang, Riccardo Spolaor, Bo Yang, Mauro Conti:
Lexical Mining of Malicious URLs for Classifying Android Malware. SecureComm (1) 2018: 248-263 - [c35]Qi He, Zhenxiang Chen, Anli Yan, Lizhi Peng, Chuan Zhao, Yuliang Shi:
TrafficPSSF: A Fast and An Effective Malware Detection Under Online and Offline. SPAC 2018: 14-19 - [c34]Anli Yan, Zhenxiang Chen, Lin Wang, Lizhi Peng, Muhammad Umair Hassan
, Chuan Zhao:
Neural Network Rule Extraction for Real Time Traffic Behavior Identification. SPAC 2018: 146-151 - [c33]Ke Ji, Yahan Yuan, Runyuan Sun, Kun Ma
, Zhenxiang Chen, Jian Liu:
A Bagging-based ensemble method for recommendations under uncertain rating data. SPAC 2018: 446-450 - 2017
- [j10]Zhenxiang Chen, Zhusong Liu, Lizhi Peng, Lin Wang, Lei Zhang:
A novel semi-supervised learning method for Internet application identification. Soft Comput. 21(8): 1963-1975 (2017) - [j9]Zhenxiang Chen, Lizhi Peng, Chongzhi Gao, Bo Yang, Yuehui Chen, Jin Li:
Flexible neural trees based early stage identification for IP traffic. Soft Comput. 21(8): 2035-2046 (2017) - [c32]Ying Pang, Zhenxiang Chen, Xiaomei Li, Shanshan Wang, Chuan Zhao, Lin Wang, Ke Ji, Zicong Li:
Finding Android Malware Trace from Highly Imbalanced Network Traffic. CSE/EUC (1) 2017: 588-595 - [c31]Fengyang Sun
, Lin Wang, Bo Yang, Jin Zhou, Zhenxiang Chen:
A Novel Method for Generating Benchmark Functions Using Recurrent Neural Network. ICIC (1) 2017: 768-773 - [c30]Shanshan Wang, Zhenxiang Chen, Xiaomei Li, Lin Wang, Ke Ji, Chuan Zhao:
Android Malware Clustering Analysis on Network-Level Behavior. ICIC (1) 2017: 796-807 - [c29]Shanshan Wang, Qiben Yan
, Zhenxiang Chen, Bo Yang, Chuan Zhao, Mauro Conti:
TextDroid: Semantics-based detection of mobile malware using network flows. INFOCOM Workshops 2017: 18-23 - [c28]Liangliang Zhang, Lin Wang, Bo Yang, Zhenxiang Chen, Jin Zhou, Yamin Han, Meihui Li:
Three dimensional segmentation for cement microtomography images using self-organizing map and neighborhood features. SSCI 2017: 1-8 - [c27]Fengyang Sun
, Lin Wang, Bo Yang, Zhenxiang Chen, Jin Zhou, Kun Tang, Jinyan Wu:
Improving Multi-layer Particle Swarm Optimization Using Powell Method. ICSI (1) 2017: 166-173 - 2016
- [j8]Lizhi Peng, Bo Yang, Yuehui Chen, Zhenxiang Chen:
Effectiveness of Statistical Features for Early Stage Internet Traffic Identification. Int. J. Parallel Program. 44(1): 181-197 (2016) - [c26]Gang Ming, Zhenxiang Chen:
Delay-Tolerant Network Based Secure Transmission System Design. CloudComp 2016: 227-231 - [c25]Lin Wang, Bo Yang, Zhenxiang Chen:
Improving Particle Swarm Optimization Using Co-Optimization of Particles and Acceleration Constants. HIS 2016: 578-587 - [c24]Yang Zhou
, Tingting Lu, Tingshao Zhu
, Zhenxiang Chen:
Environmental Incidents Detection from Chinese Microblog Based on Sentiment Analysis. HCC 2016: 849-854 - [c23]Shanshan Wang, Zhenxiang Chen, Lei Zhang, Qiben Yan
, Bo Yang, Lizhi Peng, Zhongtian Jia:
TrafficAV: An effective and explainable detection of mobile malware behavior using network traffic. IWQoS 2016: 1-6 - [c22]Zhiqiang Li, Lichao Sun, Qiben Yan
, Witawas Srisa-an, Zhenxiang Chen:
DroidClassifier: Efficient Adaptive Mining of Application-Layer Header for Classifying Android Malware. SecureComm 2016: 597-616 - [c21]Dong Cao, Shanshan Wang, Qun Li, Zhenxiang Chen, Qiben Yan
, Lizhi Peng, Bo Yang:
DroidCollector: A High Performance Framework for High Quality Android Traffic Collection. Trustcom/BigDataSE/ISPA 2016: 1753-1758 - 2015
- [c20]Tingting Lu, Shifeng Hou, Zhenxiang Chen, Lizhen Cui, Lei Zhang:
An Intention-Topic Model Based on Verbs Clustering and Short Texts Topic Mining. CIT/IUCC/DASC/PICom 2015: 837-842 - [c19]Qun Li, Lei Zhang, Shifeng Hou, Zhenxiang Chen, Hongbo Han:
Reconstruction of Android Applications' Network Behavior Based on Application Layer Traffic. ICA3PP (Workshops and Symposiums) 2015: 487-496 - [c18]Shanshan Wang, Shifeng Hou, Lei Zhang, Zhenxiang Chen, Hongbo Han:
Android Malware Network Behavior Analysis at HTTP Protocol Packet Level. ICA3PP (Workshops and Symposiums) 2015: 497-507 - [c17]Hongbo Han, Zhenxiang Chen, Qiben Yan
, Lizhi Peng, Lei Zhang:
A Real-time Android Malware Detection System Based on Network Traffic Analysis. ICA3PP (3) 2015: 504-516 - [c16]Zhenxiang Chen, Keke Wang, Lizhi Peng, Tao Sun, Lei Zhang:
High Performance NetFPGA and Multi-fractal Wavelet Model Based Network Traffic Generator. ICSI (3) 2015: 287-296 - [c15]Zhenxiang Chen, Qiben Yan, Lei Zhang, Lizhi Peng, Hongbo Han:
Using Map-Based Interactive Interface for Understanding and Characterizing Crime Data in Cities. ICSI (3) 2015: 479-490 - [c14]Zhenxiang Chen, Hongbo Han, Qiben Yan
, Bo Yang, Lizhi Peng, Lei Zhang, Jin Li:
A First Look at Android Malware Traffic in First Few Minutes. TrustCom/BigDataSE/ISPA (1) 2015: 206-213 - [i2]Jingying Wang, Tianli Liu, Tingshao Zhu, Lei Zhang, Bibo Hao, Zhenxiang Chen:
Classify Sina Weibo users into High or Low happiness Groups Using Linguistic and Behavior Features. CoRR abs/1507.01796 (2015) - 2014
- [j7]Lin Wang, Bo Yang, Yuehui Chen, Zhenxiang Chen, Hongwei Sun:
Accelerating FCM neural network classifier using graphics processing units with CUDA. Appl. Intell. 40(1): 143-153 (2014) - [j6]Hong Zhang, Yaobin Lu, Ping Gao, Zhenxiang Chen:
Social shopping communities as an emerging business model of youth entrepreneurship: exploring the effects of website characteristics. Int. J. Technol. Manag. 66(4): 319-345 (2014) - [j5]Lin Wang, Bo Yang, Ajith Abraham, Lu Qi, Xiuyang Zhao, Zhenxiang Chen:
Construction of dynamic three-dimensional microstructure for the hydration of cement using 3D image registration. Pattern Anal. Appl. 17(3): 655-665 (2014) - [c13]Lei Zhang, Xiaolei Huang, Tianli Liu, Ang Li, Zhenxiang Chen, Tingshao Zhu:
Using Linguistic Features to Estimate Suicide Probability of Chinese Microblog Users. HCC 2014: 549-559 - [c12]Zhenxiang Chen, Lizhi Peng, Shupeng Zhao, Lei Zhang, Shan Jing:
Feature Selection Toward Optimizing Internet Traffic Behavior Identification. ICA3PP (2) 2014: 631-644 - [c11]Zhenxiang Chen, Jiabin Fu, Runyuan Sun, Hongbo Han:
QR code location based reverse car-searching route recommendation model. ICVES 2014: 73-77 - [c10]Jiabin Fu, Zhenxiang Chen, Runyuan Sun:
Research on intelligent terminal oriented optimal parking space recommendation model. ITSC 2014: 2373-2378 - [i1]Lei Zhang, Xiaolei Huang, Tianli Liu, Zhenxiang Chen, Tingshao Zhu:
Using Linguistic Features to Estimate Suicide Probability of Chinese Microblog Users. CoRR abs/1411.0861 (2014) - 2012
- [j4]Lin Wang, Bo Yang, Yuehui Chen, Ajith Abraham, Hongwei Sun, Zhenxiang Chen, Haiyang Wang:
Improvement of neural network classifier using floating centroids. Knowl. Inf. Syst. 31(3): 433-454 (2012) - [c9]Lei Zhang, Yuehui Chen, Zhenxiang Chen:
Hybrid flexible neural tree for exchange rates forecasting. ICNC 2012: 418-421 - [c8]Keke Liu, Zhenxiang Chen, Ajith Abraham, Wenjie Cao, Shan Jing:
Degree-constrained minimum spanning tree problem using genetic algorithm. NaBIC 2012: 8-14 - 2011
- [j3]Kun Ma, Bo Yang, Zhenxiang Chen, Ajith Abraham:
A Relational Approach to Model Transformation with QVT Relations Supporting Model Synchronization. J. Univers. Comput. Sci. 17(13): 1863-1883 (2011) - 2010
- [j2]Bo Yang, Lin Wang, Zhenxiang Chen, Yuehui Chen, Runyuan Sun:
A novel classification method using the combination of FDPS and flexible neural tree. Neurocomputing 73(4-6): 690-699 (2010) - [c7]Runyuan Sun, Bo Yang, Lizhi Peng, Zhenxiang Chen, Lei Zhang, Shan Jing:
Traffic classification using probabilistic neural networks. ICNC 2010: 1914-1919
2000 – 2009
- 2009
- [j1]Zhenxiang Chen, Bo Yang, Yuehui Chen, Ajith Abraham, Crina Grosan, Lizhi Peng:
Online hybrid traffic classifier for Peer-to-Peer systems based on network processors. Appl. Soft Comput. 9(2): 685-694 (2009) - [c6]Xiao Xie, Bo Yang, Yuehui Chen, Lin Wang, Zhenxiang Chen:
Network Traffic Classification Based on Error-Correcting Output Codes and NN Ensemble. FSKD (3) 2009: 475-479 - 2007
- [c5]Zhenxiang Chen, Haiyang Wang, Bo Yang, Lin Wang, Runyuan Sun:
A FDRS-Based Data Classification Method Used for Abnormal Network Intrusion Detection. ICNC (2) 2007: 375-380 - [c4]Lin Wang, Bo Yang, Zhenxiang Chen, Ajith Abraham, Lizhi Peng:
A Novel Improvement of Neural Network Classification Using Further Division of Partition Space. IWINAC (1) 2007: 214-223 - 2006
- [c3]Zhenxiang Chen, Haiyang Wang, Lizhi Peng, Bo Yang, Yuehui Chen:
A Novel Method of P2P Hosts Detection Based on Flexible Neural Tree. ISDA (2) 2006: 556-561
1990 – 1999
- 1999
- [c2]Shenchu Xu, Zhenxiang Chen, Jinshui Zhong, Boxi Wu, Guoqiang Gao, Hang Xiao, Jianping Wu, Yun Shi, Jian Chen, Xiaofan Yang:
The animal tests of chaotic signal therapy for epilepsy (CSTE). IJCNN 1999: 258-261 - [c1]Yingyang Lu, Shenchu Xu, Boxi Wu, Zhenxiang Chen:
Pattern grouping strategy makes BP algorithm less sensitive to learning rate. IJCNN 1999: 1753-1756