default search action
Zhenxiang Chen
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j43]Ying Pang, Lizhi Peng, Haibo Zhang, Zhenxiang Chen, Bo Yang:
Imbalanced ensemble learning leveraging a novel data-level diversity metric. Pattern Recognit. 157: 110886 (2025) - 2024
- [j42]Xinyu Liu, Kun Ma, Ke Ji, Zhenxiang Chen, Bo Yang:
Graph-based multi-information integration network with external news environment perception for Propaganda detection. Int. J. Web Inf. Syst. 20(2): 195-212 (2024) - [j41]Lei Zhang, Yazhou Ma, Xiaojie Fan, Xiaochen Fan, Yonggang Zhang, Zhenxiang Chen, Xianyi Chen, Daqing Zhang:
Wi-Diag: Robust Multisubject Abnormal Gait Diagnosis With Commodity Wi-Fi. IEEE Internet Things J. 11(3): 4362-4376 (2024) - [j40]Peiran Peng, Zhenxiang Chen, Jianan Li, Shuaihao Han, Tongtong Gao, Lang Hong, Tingfa Xu:
Feature-Enhanced Convolutional Attention for Unstable Rock Detection in Aerial Images. IEEE Geosci. Remote. Sens. Lett. 21: 1-5 (2024) - [j39]Zhenxiang Chen, Tingfa Xu, Yongzhuo Pan, Ning Shen, Huan Chen, Jianan Li:
Edge Feature Enhancement for Fine-Grained Segmentation of Remote Sensing Images. IEEE Trans. Geosci. Remote. Sens. 62: 1-13 (2024) - [c99]Hui Liu, Ke Ji, Zhenxiang Chen, Kun Ma, Xiaofan Zhao:
Malicious Attack Detection Method for Recommendation Systems Based on Meta-pseudo Labels and Dynamic Features. APWeb/WAIM (4) 2024: 379-393 - [c98]Yuchen Liu, Shanshan Wang, Jin Au-Yeung, Zhenxiang Chen:
Encrypted Malicious Traffic Detection Based on Graph Convolutional Network and Temporal Dissection. CSCWD 2024: 187-192 - [c97]Aihua Yang, Tianke Fang, Elcid A. Serrano, Yusen Chi, Fucai Liu, Zhenxiang Chen:
Inspection Robot Fault Detection Based on Electric Power Big Data and Target Detection Algorithm. FAIML 2024: 153-156 - [c96]Changlin Liu, Shanshan Wang, Zhenxiang Chen, Limei Huang, Yan Li, Hanwen Li:
KGhish: A Phishing Website Detection Method Based on Knowledge Graph. ICIC (13) 2024: 300-311 - [c95]Hanwen Li, Shanshan Wang, Yadi Han, Changlin Liu, Zhenxiang Chen:
Constructing Adversarial Network Attacks in Realistic Network Environments. ICIC (9) 2024: 422-435 - [c94]Huan Chen, Tingfa Xu, Zhenxiang Chen, Peifu Liu, Huiyan Bai, Jianan Li:
Multi-scale Change-Aware Transformer for Remote Sensing Image Change Detection. ACM Multimedia 2024: 2992-3000 - [c93]Yongxin Yu, Ke Ji, Yuan Gao, Zhenxiang Chen, Kun Ma, Jun Wu:
MHDF: Multi-source Heterogeneous Data Progressive Fusion for Fake News Detection. PAKDD (5) 2024: 28-39 - 2023
- [j38]Kun Ma, Changhao Tang, Weijuan Zhang, Benkuan Cui, Ke Ji, Zhenxiang Chen, Ajith Abraham:
DC-CNN: Dual-channel Convolutional Neural Networks with attention-pooling for fake news detection. Appl. Intell. 53(7): 8354-8369 (2023) - [j37]Benkuan Cui, Kun Ma, Leping Li, Weijuan Zhang, Ke Ji, Zhenxiang Chen, Ajith Abraham:
Intra-graph and Inter-graph joint information propagation network with third-order text graph tensor for fake news detection. Appl. Intell. 53(16): 18971-18988 (2023) - [j36]Jing Chen, Kun Ma, Ke Ji, Zhenxiang Chen:
TM-HOL: Topic memory model for detection of hate speech and offensive language. Concurr. Comput. Pract. Exp. 35(14) (2023) - [j35]Abbas Arghavani, Haibo Zhang, Zhiyi Huang, Yawen Chen, Zhenxiang Chen:
Tuatara: Location-Driven Power-Adaptive Communication for Wireless Body Area Networks. IEEE Trans. Mob. Comput. 22(1): 574-588 (2023) - [c92]Shuhao Yan, Shanshan Wang, Zhenxiang Chen, Xiaoqing Jiang, Xueyang Cao:
CSLog: Anomaly Detection for Syslog Based on Contrastive Self-Supervised Representation Learning. APNOMS 2023: 165-170 - [c91]Chenghan Wang, Shanshan Wang, Chuan Zhao, Xueyang Cao, Shuhao Yan, Yadi Han, Limei Huang, Zhenxiang Chen:
The Secondary Isolated Data Island: Isolated Data Island Caused by Blockchain in Federated Learning. BIBM 2023: 4159-4166 - [c90]Hucheng Wang, Zhenxiang Chen, Xiaoqing Jiang, Bo Yang:
Estimate Heart Rate from Recovered Facial Signal. BIC 2023: 50-54 - [c89]Zhengli Wang, Zhenxiang Chen, Xiaoqing Jiang, Peicheng Wang, Hucheng Wang:
Prediction method for college student's mental health state based on association rules. BIC 2023: 367-371 - [c88]Daokuan Bai, Shanshan Wang, Wenyue Wang, Hua Wang, Chuan Zhao, Peng Yuan, Zhenxiang Chen:
Overcoming Noisy Labels in Federated Learning Through Local Self-Guiding. CCGrid 2023: 367-376 - [c87]Weiliang Zheng, Zhenxiang Chen, Yang Li, Xiaoqing Jiang, Xueyang Cao:
Speaker recognition system of flexible throat microphone using contrastive learning. CCGrid 2023: 640-650 - [c86]Chenghan Wang, Shanshan Wang, Chuan Zhao, Wenyue Wang, Bin Hu, Youmian Wang, Lin Wang, Zhenxiang Chen:
Decentralized Reinforced Anonymous FLchain: a Secure Federated Learning Architecture for the Medical Industry. COMPSAC 2023: 396-405 - [c85]Yadi Han, Shanshan Wang, Yiwen Li, Xueyang Cao, Limei Huang, Zhenxiang Chen:
Measurement of Illegal Android Gambling App Ecosystem From Joint Promotion Perspective. DSAA 2023: 1-11 - [c84]Peicheng Wang, Zhenxiang Chen, Xiaoqing Jiang, Yanqi Song:
Psychological Stress Assessment Method Based on Learning Using Privileged Information Framework. ICBIP 2023: 91-97 - [c83]Peng Yuan, Shanshan Wang, Chuan Zhao, Wenyue Wang, Daokuan Bai, Lizhi Peng, Zhenxiang Chen:
Adversarial Attack with Genetic Algorithm against IoT Malware Detectors. ICC 2023: 1413-1418 - [c82]Yuhui Zhu, Zhenxiang Chen, Qiben Yan, Shanshan Wang, Alberto Giaretta, Enlong Li, Lizhi Peng, Chuan Zhao, Mauro Conti:
Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders. ICC 2023: 2338-2344 - [c81]Yiwen Li, Shanshan Wang, Zhenxiang Chen, Xueyang Cao, Yadi Han:
Exploring Wi-Fi Privacy Disclosure: A Novel Approach to User Identity Prediction Based on Traffic Multi-level Information. ICPADS 2023: 2049-2056 - [c80]Yongxin Yu, Ke Ji, Yuan Gao, Zhenxiang Chen, Kun Ma, Jun Wu:
Multimodal Fake News Detection Based on Multi-source Heterogeneous Data Fusion. PAAP 2023: 1-6 - [c79]Limei Huang, Shanshan Wang, Changlin Liu, Xueyang Cao, Yadi Han, Shaolei Liu, Zhenxiang Chen:
Low-Frequency Aware Unsupervised Detection of Dark Jargon Phrases on Social Platforms. PRICAI (2) 2023: 198-209 - [c78]Jun Xu, Shengnan Zhao, Chuan Zhao, Zhenxiang Chen, Zhe Liu, Liming Fang:
Practical Single-Round Secure Wildcard Pattern Matching. SEC 2023: 87-101 - [c77]Jin Au-Yeung, Shanshan Wang, Yuchen Liu, Zhenxiang Chen:
Safety or Not? A Comparative Study for Deep Learning Apps on Smartphones. TrustCom 2023: 109-116 - 2022
- [j34]Haixin Jia, Mohammed Shujaa Aldeen, Chuan Zhao, Shan Jing, Zhenxiang Chen:
Flexible privacy-preserving machine learning: When searchable encryption meets homomorphic encryption. Int. J. Intell. Syst. 37(11): 9173-9191 (2022) - [j33]Shuangrong Liu, Lin Wang, Bo Yang, Jin Zhou, Zhenxiang Chen, Huifen Dong:
Improvement of Neural-Network Classifiers Using Fuzzy Floating Centroids. IEEE Trans. Cybern. 52(3): 1392-1404 (2022) - [j32]Yuxi Xie, Min Qiu, Haibo Zhang, Lizhi Peng, Zhenxiang Chen:
Gaussian Distribution Based Oversampling for Imbalanced Data Classification. IEEE Trans. Knowl. Data Eng. 34(2): 667-679 (2022) - [c76]Yanqiang Li, Ke Ji, Kun Ma, Zhenxiang Chen, Jin Zhou, Jun Wu:
Fake News Detection Based on the Correlation Extension of Multimodal Information. APWeb/WAIM (1) 2022: 443-450 - [c75]Xueyang Cao, Shanshan Wang, Zhenxiang Chen, Xiaoqing Jiang, Weiliang Zheng, Yadi Han:
Decision-based adversarial attack for speaker recognition models. CSAI 2022: 278-283 - [c74]Nasimul Hasan, Zhenxiang Chen, Chuan Zhao, Yuhui Zhu, Cong Liu:
IoT Botnet Detection framework from Network Behavior based on Extreme Learning Machine. INFOCOM Workshops 2022: 1-6 - [c73]Wenyue Wang, Shanshan Wang, Daokuan Bai, Chuan Zhao, Lizhi Peng, Zhenxiang Chen:
SFMD: A Semi-Supervised Federated Malicious Traffic Detection Approach in IoT. ISPA/BDCloud/SocialCom/SustainCom 2022: 774-781 - [c72]Tianqi Ren, Ke Ji, Zhenxiang Chen, Runyuan Sun, Kun Ma, Jin Zhou:
Fake news detection method based on multi-feature fusion of entity and structured text. PAAP 2022: 1-6 - [c71]Youmian Wang, Bin Hu, Zhenxiang Chen, Xiaoqing Jiang, Wenjuan Liu, Peicheng Wang:
INSIDER: A framework for assessing confidence in psychological scales based on multi-modal physiological signal fusion. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 1298-1303 - [i5]Yuhui Zhu, Zhenxiang Chen, Qiben Yan, Shanshan Wang, Enlong Li, Lizhi Peng, Chuan Zhao:
Mining Function Homology of Bot Loaders from Honeypot Logs. CoRR abs/2206.00385 (2022) - [i4]Yuhui Zhu, Zhenxiang Chen, Qiben Yan, Shanshan Wang, Alberto Giaretta, Enlong Li, Lizhi Peng, Chuan Zhao, Mauro Conti:
Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders. CoRR abs/2211.14790 (2022) - 2021
- [j31]Yong-Feng Ge, Jinli Cao, Hua Wang, Zhenxiang Chen, Yanchun Zhang:
Set-Based Adaptive Distributed Differential Evolution for Anonymity-Driven Database Fragmentation. Data Sci. Eng. 6(4): 380-391 (2021) - [j30]Zhihao Hou, Kun Ma, Yufeng Wang, Jia Yu, Ke Ji, Zhenxiang Chen, Ajith Abraham:
Attention-based learning of self-media data for marketing intention detection. Eng. Appl. Artif. Intell. 98: 104118 (2021) - [j29]Anli Yan, Zhenxiang Chen, Haibo Zhang, Lizhi Peng, Qiben Yan, Muhammad Umair Hassan, Chuan Zhao, Bo Yang:
Effective detection of mobile malware behavior based on explainable deep neural network. Neurocomputing 453: 482-492 (2021) - [j28]Lijun Sun, Qian Yang, Xiao Chen, Zhenxiang Chen:
RC-chain: Reputation-based crowdsourcing blockchain for vehicular networks. J. Netw. Comput. Appl. 176: 102956 (2021) - [c70]Qian Zhang, Shan Jing, Chuan Zhao, Bo Zhang, Zhenxiang Chen:
Efficient Federated Learning Framework Based on Multi-Key Homomorphic Encryption. 3PGCIC 2021: 88-105 - [c69]Hanchen Xu, Zhenxiang Chen, Shanshan Wang, Xiaoqing Jiang:
Chinese NER Using ALBERT and Multi-word Information. ACM TUR-C 2021: 141-145 - [c68]Nobukazu Yoshioka, Jati H. Husen, Hnin Thandar Tun, Zhenxiang Chen, Hironori Washizaki, Yoshiaki Fukazawa:
Landscape of Requirements Engineering for Machine Learning-based AI Systems. APSEC Workshops 2021: 5-8 - [c67]Zhenxiang Chen, Wangwang Yu, Haohan Bai, Yong Li:
An Arcloss-Based and Openset-Test-Oriented Finger Vein Recognition System. CCBR 2021: 287-294 - [c66]Yanqi Li, Ke Ji, Kun Ma, Zhenxiang Chen, Jun Wu, Yidong Li:
Enhancing Fake News Classification by Generating Neural Fake Samples. DTPI 2021: 152-155 - [c65]Hao Li, Shanqing Guo, Peng Tang, Chengyu Hu, Zhenxiang Chen:
TranFuzz: An Ensemble Black-Box Attack Framework Based on Domain Adaptation and Fuzzing. ICICS (1) 2021: 260-275 - [c64]Cong Liu, Anli Yan, Zhenxiang Chen, Haibo Zhang, Qiben Yan, Lizhi Peng, Chuan Zhao:
IEdroid: Detecting Malicious Android Network Behavior Using Incremental Ensemble of Ensembles. ICPADS 2021: 788-795 - [c63]Gang Zhang, Hao Li, Zhenxiang Chen, Lizhi Peng, Yuhui Zhu, Chuan Zhao:
AndroCreme: Unseen Android Malware Detection Based on Inductive Conformal Learning. TrustCom 2021: 651-658 - [c62]Yanqi Li, Ke Ji, Kun Ma, Zhenxiang Chen, Jun Wu, Yidong Li, Guandong Xu:
HACK: A Hierarchical Model for Fake News Detection. WISE (1) 2021: 565-572 - [c61]Xiaoqi Lv, Ke Ji, Zhenxiang Chen, Kun Ma, Jun Wu, Yidong Li, Guandong Xu:
Expert Recommendations with Temporal Dynamics of User Interest in CQA. WISE (1) 2021: 645-652 - 2020
- [j27]Ravinder Singh, Sudha Subramani, Jiahua Du, Yanchun Zhang, Hua Wang, Khandakar Ahmed, Zhenxiang Chen:
Deep Learning for Multi-Class Antisocial Behavior Identification From Twitter. IEEE Access 8: 194027-194044 (2020) - [j26]Jifeng Guo, Meihui Li, Lin Wang, Bo Yang, Liangliang Zhang, Zhenxiang Chen, Shi-Yuan Han, Laura García-Hernandez, Ajith Abraham:
Estimating cement compressive strength using three-dimensional microstructure images and deep belief network. Eng. Appl. Artif. Intell. 88 (2020) - [j25]Yufeng Wang, Kun Ma, Laura García-Hernández, Jing Chen, Zhihao Hou, Ke Ji, Zhenxiang Chen, Ajith Abraham:
A CLSTM-TMN for marketing intention detection. Eng. Appl. Artif. Intell. 91: 103595 (2020) - [j24]Qi Zhao, Chuan Zhao, Shujie Cui, Shan Jing, Zhenxiang Chen:
PrivateDL PrivateDL : Privacy-preserving collaborative deep learning against leakage from gradient sharing. Int. J. Intell. Syst. 35(8): 1262-1279 (2020) - [j23]Shanshan Wang, Zhenxiang Chen, Qiben Yan, Ke Ji, Lizhi Peng, Bo Yang, Mauro Conti:
Deep and broad URL feature mining for android malware detection. Inf. Sci. 513: 600-613 (2020) - [j22]Chuan Zhao, Shengnan Zhao, Bo Zhang, Shan Jing, Zhenxiang Chen, Minghao Zhao:
Oblivious DFA evaluation on joint input and its applications. Inf. Sci. 528: 168-180 (2020) - [j21]Anqi Teng, Lizhi Peng, Yuxi Xie, Haibo Zhang, Zhenxiang Chen:
Gradient descent evolved imbalanced data gravitation classification with an application on Internet video traffic identification. Inf. Sci. 539: 447-460 (2020) - [c60]Bing Han, Zhenxiang Chen, Cong Liu, Mingyue Shang:
Design and Implementation of Big Data Management Platform for Android Applications. ICBDT 2020: 36-40 - [c59]Zhenxiang Chen, Hironori Washizaki, Yoshiaki Fukazawa:
Automated Tool for Revising Masking MC/DC Test Suite. ISSRE Workshops 2020: 157-158 - [c58]Anli Yan, Zhenxiang Chen, Riccardo Spolaor, Shuaishuai Tan, Chuan Zhao, Lizhi Peng, Bo Yang:
Network-based Malware Detection with a Two-tier Architecture for Online Incremental Update. IWQoS 2020: 1-10 - [c57]Yong-Feng Ge, Jinli Cao, Hua Wang, Yanchun Zhang, Zhenxiang Chen:
Distributed Differential Evolution for Anonymity-Driven Vertical Fragmentation in Outsourced Data Storage. WISE (2) 2020: 213-226 - [i3]Lijun Sun, Qian Yang, Xiao Chen, Zhenxiang Chen:
RC-chain: Reputation-based Crowdsourcing Blockchain for Vehicular Networks. CoRR abs/2012.11120 (2020)
2010 – 2019
- 2019
- [j20]Yuxi Xie, Lizhi Peng, Zhenxiang Chen, Bo Yang, Hongli Zhang, Haibo Zhang:
Generative learning for imbalanced data using the Gaussian mixed model. Appl. Soft Comput. 79: 439-451 (2019) - [j19]Chuan Zhao, Shengnan Zhao, Minghao Zhao, Zhenxiang Chen, Chong-Zhi Gao, Hongwei Li, Yu-an Tan:
Secure Multi-Party Computation: Theory, practice and applications. Inf. Sci. 476: 357-372 (2019) - [j18]Ying Pang, Lizhi Peng, Zhenxiang Chen, Bo Yang, Hongli Zhang:
Imbalanced learning based on adaptive weighting and Gaussian function synthesizing with an application on Android malware detection. Inf. Sci. 484: 95-112 (2019) - [j17]Hanbo Deng, Lizhi Peng, Haibo Zhang, Bo Yang, Zhenxiang Chen:
Ranking-based biased learning swarm optimizer for large-scale optimization. Inf. Sci. 493: 120-137 (2019) - [j16]Shanshan Wang, Zhenxiang Chen, Qiben Yan, Bo Yang, Lizhi Peng, Zhongtian Jia:
A mobile malware detection method using behavior features in network traffic. J. Netw. Comput. Appl. 133: 15-25 (2019) - [c56]Ke Ji, Yahan Yuan, Kun Ma, Runyuan Sun, Zhenxiang Chen, Jun Wu:
Context-aware recommendations via a tree-based ensemble framework. ACM TUR-C 2019: 50:1-50:5 - [c55]Ke Ji, Yahan Yuan, Ruanyuan Sun, Lin Wang, Kun Ma, Zhenxiang Chen:
Abnormal telephone identification via an ensemble-based classification framework. ACM TUR-C 2019: 63:1-63:6 - [c54]Yahan Yuan, Ke Ji, Runyuan Sun, Kun Ma, Zhenxiang Chen, Lin Wang:
An Integration Method Of Classifiers For Abnormal Phone Detection. BESC 2019: 1-6 - [c53]Anqi Teng, Lizhi Peng, Yuxi Xie, Haibo Zhang, Zhenxiang Chen:
Imbalanced Data Gravitation Classification Model Using For Internet Video Traffic Identification. BigDataSecurity/HPSC/IDS 2019: 172-177 - [c52]Chuan Zhao, Shengnan Zhao, Bo Zhang, Shan Jing, Zhenxiang Chen, Minghao Zhao:
Towards Secure Computation of Similar Patient Query on Genomic Data Under Multiple Keys. CSS (2) 2019: 275-284 - [c51]Songqian Li, Kun Ma, Xuewei Niu, Yufeng Wang, Ke Ji, Ziqiang Yu, Zhenxiang Chen:
Stacking-Based Ensemble Learning on Low Dimensional Features for Fake News Detection. HPCC/SmartCity/DSS 2019: 2730-2735 - [c50]Cong Liu, Zhenxiang Chen, Dong Cao, Mingyue Shang:
Application of Recommender System in Intelligent Community under Big Data Scenario. ICBDT 2019: 92-96 - [c49]Hao Li, Zhenxiang Chen, Riccardo Spolaor, Qiben Yan, Chuan Zhao, Bo Yang:
DART: Detecting Unseen Malware Variants using Adaptation Regularization Transfer Learning. ICC 2019: 1-6 - [c48]Jian Liu, Ke Ji, Runyuan Sun, Kun Ma, Zhenxiang Chen, Lin Wang:
Abnormal Phone Analysis Based on Learning to Rank and Ensemble Learning in Environment of Telecom Big Data. ICMLC 2019: 301-305 - [c47]Yahan Yuan, Ke Ji, Runyuan Sun, Kun Ma, Zhenxiang Chen, Lin Wang:
An Abnormal Phone Identification Model with Meta-learning Two-layer Framework Based on PCA Dimension Reduction. ICMLC 2019: 511-515 - [c46]Ying Pang, Zhenxiang Chen, Lizhi Peng, Kun Ma, Chuan Zhao, Ke Ji:
A Signature-Based Assistant Random Oversampling Method for Malware Detection. TrustCom/BigDataSE 2019: 256-263 - 2018
- [j15]Chuan Zhao, Shengnan Zhao, Bo Zhang, Zhongtian Jia, Zhenxiang Chen, Mauro Conti:
Secure Comparison Under Ideal/Real Simulation Paradigm. IEEE Access 6: 31236-31248 (2018) - [j14]Ke Ji, Zhenxiang Chen, Runyuan Sun, Kun Ma, Zhongjie Yuan, Guandong Xu:
GIST: A generative model with individual and subgroup-based topics for group recommendation. Expert Syst. Appl. 94: 81-93 (2018) - [j13]Zhenxiang Chen, Qiben Yan, Hongbo Han, Shanshan Wang, Lizhi Peng, Lin Wang, Bo Yang:
Machine learning based mobile malware detection using highly imbalanced network traffic. Inf. Sci. 433-434: 346-364 (2018) - [j12]Zhiquan Feng, Bo Yang, Tao Xu, Xiaohui Yang, We Xie, Changsheng Ai, Zhenxiang Chen:
FM: Flexible mapping from one gesture to multiple semantics. Inf. Sci. 467: 654-669 (2018) - [j11]Shanshan Wang, Qiben Yan, Zhenxiang Chen, Bo Yang, Chuan Zhao, Mauro Conti:
Detecting Android Malware Leveraging Text Semantics of Network Flows. IEEE Trans. Inf. Forensics Secur. 13(5): 1096-1109 (2018) - [c45]Mohannad Alhanahnah, Qicheng Lin, Qiben Yan, Ning Zhang, Zhenxiang Chen:
Efficient Signature Generation for Classifying Cross-Architecture IoT Malware. CNS 2018: 1-9 - [c44]Changwei Cai, Shuangrong Liu, Lin Wang, Bo Yang, Zhenxiang Chen, Jin Zhou:
Optimizing floating centroids method neural network classifier using dynamic multilayer particle swarm optimization. GECCO 2018: 394-401 - [c43]Xuehui Zhu, He Zhang, Lin Wang, Bo Yang, Jin Zhou, Zhenxiang Chen, Ajith Abraham:
Improving Nearest Neighbor Partitioning Neural Network Classifier Using Multi-layer Particle Swarm Optimization. HIS 2018: 360-369 - [c42]Yuxi Xie, Hanbo Deng, Lizhi Peng, Zhenxiang Chen:
Accurate Identification of Internet Video Traffic Using Byte Code Distribution Features. ICA3PP (1) 2018: 46-58 - [c41]Anran Liu, Zhenxiang Chen, Shanshan Wang, Lizhi Peng, Chuan Zhao, Yuliang Shi:
A Fast and Effective Detection of Mobile Malware Behavior Using Network Traffic. ICA3PP (4) 2018: 109-120 - [c40]Qun Li, Zhenxiang Chen, Qiben Yan, Shanshan Wang, Kun Ma, Yuliang Shi, Lizhen Cui:
MulAV: Multilevel and Explainable Detection of Android Malware with Data Fusion. ICA3PP (4) 2018: 166-177 - [c39]Yongzheng Lin, Hong Liu, Zhenxiang Chen, Kun Zhang, Kun Ma:
Adaptive Data Sampling Mechanism for Process Object. ICA3PP (1) 2018: 257-266 - [c38]Qi He, Zhenxiang Chen, Ke Ji, Lin Wang, Kun Ma, Chuan Zhao, Yuliang Shi:
Cluster Center Initialization and Outlier Detection Based on Distance and Density for the K-Means Algorithm. ISDA (1) 2018: 530-539 - [c37]Shanshan Wang, Zhenxiang Chen, Qiben Yan, Ke Ji, Lin Wang, Bo Yang, Mauro Conti:
Deep and Broad Learning Based Detection of Android Malware via Network Traffic. IWQoS 2018: 1-6 - [c36]Shanshan Wang, Qiben Yan, Zhenxiang Chen, Lin Wang, Riccardo Spolaor, Bo Yang, Mauro Conti:
Lexical Mining of Malicious URLs for Classifying Android Malware. SecureComm (1) 2018: 248-263 - [c35]Qi He, Zhenxiang Chen, Anli Yan, Lizhi Peng, Chuan Zhao, Yuliang Shi:
TrafficPSSF: A Fast and An Effective Malware Detection Under Online and Offline. SPAC 2018: 14-19 - [c34]Anli Yan, Zhenxiang Chen, Lin Wang, Lizhi Peng, Muhammad Umair Hassan, Chuan Zhao:
Neural Network Rule Extraction for Real Time Traffic Behavior Identification. SPAC 2018: 146-151 - [c33]Ke Ji, Yahan Yuan, Runyuan Sun, Kun Ma, Zhenxiang Chen, Jian Liu:
A Bagging-based ensemble method for recommendations under uncertain rating data. SPAC 2018: 446-450 - 2017
- [j10]Zhenxiang Chen, Zhusong Liu, Lizhi Peng, Lin Wang, Lei Zhang:
A novel semi-supervised learning method for Internet application identification. Soft Comput. 21(8): 1963-1975 (2017) - [j9]Zhenxiang Chen, Lizhi Peng, Chongzhi Gao, Bo Yang, Yuehui Chen, Jin Li:
Flexible neural trees based early stage identification for IP traffic. Soft Comput. 21(8): 2035-2046 (2017) - [c32]Ying Pang, Zhenxiang Chen, Xiaomei Li, Shanshan Wang, Chuan Zhao, Lin Wang, Ke Ji, Zicong Li:
Finding Android Malware Trace from Highly Imbalanced Network Traffic. CSE/EUC (1) 2017: 588-595 - [c31]Fengyang Sun, Lin Wang, Bo Yang, Jin Zhou, Zhenxiang Chen:
A Novel Method for Generating Benchmark Functions Using Recurrent Neural Network. ICIC (1) 2017: 768-773 - [c30]Shanshan Wang, Zhenxiang Chen, Xiaomei Li, Lin Wang, Ke Ji, Chuan Zhao:
Android Malware Clustering Analysis on Network-Level Behavior. ICIC (1) 2017: 796-807 - [c29]Shanshan Wang, Qiben Yan, Zhenxiang Chen, Bo Yang, Chuan Zhao, Mauro Conti:
TextDroid: Semantics-based detection of mobile malware using network flows. INFOCOM Workshops 2017: 18-23 - [c28]Liangliang Zhang, Lin Wang, Bo Yang, Zhenxiang Chen, Jin Zhou, Yamin Han, Meihui Li:
Three dimensional segmentation for cement microtomography images using self-organizing map and neighborhood features. SSCI 2017: 1-8 - [c27]Fengyang Sun, Lin Wang, Bo Yang, Zhenxiang Chen, Jin Zhou, Kun Tang, Jinyan Wu:
Improving Multi-layer Particle Swarm Optimization Using Powell Method. ICSI (1) 2017: 166-173 - 2016
- [j8]Lizhi Peng, Bo Yang, Yuehui Chen, Zhenxiang Chen:
Effectiveness of Statistical Features for Early Stage Internet Traffic Identification. Int. J. Parallel Program. 44(1): 181-197 (2016) - [c26]Gang Ming, Zhenxiang Chen:
Delay-Tolerant Network Based Secure Transmission System Design. CloudComp 2016: 227-231 - [c25]Lin Wang, Bo Yang, Zhenxiang Chen:
Improving Particle Swarm Optimization Using Co-Optimization of Particles and Acceleration Constants. HIS 2016: 578-587 - [c24]Yang Zhou, Tingting Lu, Tingshao Zhu, Zhenxiang Chen:
Environmental Incidents Detection from Chinese Microblog Based on Sentiment Analysis. HCC 2016: 849-854 - [c23]Shanshan Wang, Zhenxiang Chen, Lei Zhang, Qiben Yan, Bo Yang, Lizhi Peng, Zhongtian Jia:
TrafficAV: An effective and explainable detection of mobile malware behavior using network traffic. IWQoS 2016: 1-6 - [c22]Zhiqiang Li, Lichao Sun, Qiben Yan, Witawas Srisa-an, Zhenxiang Chen:
DroidClassifier: Efficient Adaptive Mining of Application-Layer Header for Classifying Android Malware. SecureComm 2016: 597-616 - [c21]Dong Cao, Shanshan Wang, Qun Li, Zhenxiang Chen, Qiben Yan, Lizhi Peng, Bo Yang:
DroidCollector: A High Performance Framework for High Quality Android Traffic Collection. Trustcom/BigDataSE/ISPA 2016: 1753-1758 - 2015
- [c20]Tingting Lu, Shifeng Hou, Zhenxiang Chen, Lizhen Cui, Lei Zhang:
An Intention-Topic Model Based on Verbs Clustering and Short Texts Topic Mining. CIT/IUCC/DASC/PICom 2015: 837-842 - [c19]Qun Li, Lei Zhang, Shifeng Hou, Zhenxiang Chen, Hongbo Han:
Reconstruction of Android Applications' Network Behavior Based on Application Layer Traffic. ICA3PP (Workshops and Symposiums) 2015: 487-496 - [c18]Shanshan Wang, Shifeng Hou, Lei Zhang, Zhenxiang Chen, Hongbo Han:
Android Malware Network Behavior Analysis at HTTP Protocol Packet Level. ICA3PP (Workshops and Symposiums) 2015: 497-507 - [c17]Hongbo Han, Zhenxiang Chen, Qiben Yan, Lizhi Peng, Lei Zhang:
A Real-time Android Malware Detection System Based on Network Traffic Analysis. ICA3PP (3) 2015: 504-516 - [c16]Zhenxiang Chen, Keke Wang, Lizhi Peng, Tao Sun, Lei Zhang:
High Performance NetFPGA and Multi-fractal Wavelet Model Based Network Traffic Generator. ICSI (3) 2015: 287-296 - [c15]Zhenxiang Chen, Qiben Yan, Lei Zhang, Lizhi Peng, Hongbo Han:
Using Map-Based Interactive Interface for Understanding and Characterizing Crime Data in Cities. ICSI (3) 2015: 479-490 - [c14]Zhenxiang Chen, Hongbo Han, Qiben Yan, Bo Yang, Lizhi Peng, Lei Zhang, Jin Li:
A First Look at Android Malware Traffic in First Few Minutes. TrustCom/BigDataSE/ISPA (1) 2015: 206-213 - [i2]Jingying Wang, Tianli Liu, Tingshao Zhu, Lei Zhang, Bibo Hao, Zhenxiang Chen:
Classify Sina Weibo users into High or Low happiness Groups Using Linguistic and Behavior Features. CoRR abs/1507.01796 (2015) - 2014
- [j7]Lin Wang, Bo Yang, Yuehui Chen, Zhenxiang Chen, Hongwei Sun:
Accelerating FCM neural network classifier using graphics processing units with CUDA. Appl. Intell. 40(1): 143-153 (2014) - [j6]Hong Zhang, Yaobin Lu, Ping Gao, Zhenxiang Chen:
Social shopping communities as an emerging business model of youth entrepreneurship: exploring the effects of website characteristics. Int. J. Technol. Manag. 66(4): 319-345 (2014) - [j5]Lin Wang, Bo Yang, Ajith Abraham, Lu Qi, Xiuyang Zhao, Zhenxiang Chen:
Construction of dynamic three-dimensional microstructure for the hydration of cement using 3D image registration. Pattern Anal. Appl. 17(3): 655-665 (2014) - [c13]Lei Zhang, Xiaolei Huang, Tianli Liu, Ang Li, Zhenxiang Chen, Tingshao Zhu:
Using Linguistic Features to Estimate Suicide Probability of Chinese Microblog Users. HCC 2014: 549-559 - [c12]Zhenxiang Chen, Lizhi Peng, Shupeng Zhao, Lei Zhang, Shan Jing:
Feature Selection Toward Optimizing Internet Traffic Behavior Identification. ICA3PP (2) 2014: 631-644 - [c11]Zhenxiang Chen, Jiabin Fu, Runyuan Sun, Hongbo Han:
QR code location based reverse car-searching route recommendation model. ICVES 2014: 73-77 - [c10]Jiabin Fu, Zhenxiang Chen, Runyuan Sun:
Research on intelligent terminal oriented optimal parking space recommendation model. ITSC 2014: 2373-2378 - [i1]Lei Zhang, Xiaolei Huang, Tianli Liu, Zhenxiang Chen, Tingshao Zhu:
Using Linguistic Features to Estimate Suicide Probability of Chinese Microblog Users. CoRR abs/1411.0861 (2014) - 2012
- [j4]Lin Wang, Bo Yang, Yuehui Chen, Ajith Abraham, Hongwei Sun, Zhenxiang Chen, Haiyang Wang:
Improvement of neural network classifier using floating centroids. Knowl. Inf. Syst. 31(3): 433-454 (2012) - [c9]Lei Zhang, Yuehui Chen, Zhenxiang Chen:
Hybrid flexible neural tree for exchange rates forecasting. ICNC 2012: 418-421 - [c8]Keke Liu, Zhenxiang Chen, Ajith Abraham, Wenjie Cao, Shan Jing:
Degree-constrained minimum spanning tree problem using genetic algorithm. NaBIC 2012: 8-14 - 2011
- [j3]Kun Ma, Bo Yang, Zhenxiang Chen, Ajith Abraham:
A Relational Approach to Model Transformation with QVT Relations Supporting Model Synchronization. J. Univers. Comput. Sci. 17(13): 1863-1883 (2011) - 2010
- [j2]Bo Yang, Lin Wang, Zhenxiang Chen, Yuehui Chen, Runyuan Sun:
A novel classification method using the combination of FDPS and flexible neural tree. Neurocomputing 73(4-6): 690-699 (2010) - [c7]Runyuan Sun, Bo Yang, Lizhi Peng, Zhenxiang Chen, Lei Zhang, Shan Jing:
Traffic classification using probabilistic neural networks. ICNC 2010: 1914-1919
2000 – 2009
- 2009
- [j1]Zhenxiang Chen, Bo Yang, Yuehui Chen, Ajith Abraham, Crina Grosan, Lizhi Peng:
Online hybrid traffic classifier for Peer-to-Peer systems based on network processors. Appl. Soft Comput. 9(2): 685-694 (2009) - [c6]Xiao Xie, Bo Yang, Yuehui Chen, Lin Wang, Zhenxiang Chen:
Network Traffic Classification Based on Error-Correcting Output Codes and NN Ensemble. FSKD (3) 2009: 475-479 - 2007
- [c5]Zhenxiang Chen, Haiyang Wang, Bo Yang, Lin Wang, Runyuan Sun:
A FDRS-Based Data Classification Method Used for Abnormal Network Intrusion Detection. ICNC (2) 2007: 375-380 - [c4]Lin Wang, Bo Yang, Zhenxiang Chen, Ajith Abraham, Lizhi Peng:
A Novel Improvement of Neural Network Classification Using Further Division of Partition Space. IWINAC (1) 2007: 214-223 - 2006
- [c3]Zhenxiang Chen, Haiyang Wang, Lizhi Peng, Bo Yang, Yuehui Chen:
A Novel Method of P2P Hosts Detection Based on Flexible Neural Tree. ISDA (2) 2006: 556-561
1990 – 1999
- 1999
- [c2]Shenchu Xu, Zhenxiang Chen, Jinshui Zhong, Boxi Wu, Guoqiang Gao, Hang Xiao, Jianping Wu, Yun Shi, Jian Chen, Xiaofan Yang:
The animal tests of chaotic signal therapy for epilepsy (CSTE). IJCNN 1999: 258-261 - [c1]Yingyang Lu, Shenchu Xu, Boxi Wu, Zhenxiang Chen:
Pattern grouping strategy makes BP algorithm less sensitive to learning rate. IJCNN 1999: 1753-1756
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint