default search action
Xiuzhen Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Xiuzhen Chen, Weicheng Qiu, Lixing Chen, Yinghua Ma, Jin Ma:
Fast and practical intrusion detection system based on federated learning for VANET. Comput. Secur. 142: 103881 (2024) - [j9]Xiuzhen Chen, Hye Kyung Kim:
The Relationship Between Emotional Intelligence, Mental Health, and the English Achievement of College Students Based on Big Data Statistical Analysis. Int. J. Web Based Learn. Teach. Technol. 19(1): 1-16 (2024) - [c19]Xintian Ren, Jun Wu, Hansong Xu, Xiuzhen Chen:
Diffusion Model Based Secure Semantic Communications with Adversarial Purification. BigDataSecurity 2024: 130-134 - [c18]Yihang Tao, Jun Wu, Qianqian Pan, Xiuzhen Chen:
Energy Harvesting Design for Cooperative Reconfigurable Intelligent Surface with Multi-Agent Deep Reinforcement Learning. IDS 2024: 42-46 - [c17]Yong Xiao, Jin Ma, Ping Yi, Xiuzhen Chen:
Sponge Backdoor Attack: Increasing the Latency of Object Detection Exploiting Non-Maximum Suppression. IJCNN 2024: 1-8 - [c16]Yunfan Zhan, Qidan He, Yijun Wang, Xiuzhen Chen:
PMDET: Automated Detection Tool of Android Parcel Mismatch. SANER 2024: 250-254 - 2022
- [j8]Weicheng Qiu, Yinghua Ma, Xiuzhen Chen, Haiyang Yu, Lixing Chen:
Hybrid intrusion detection system based on Dempster-Shafer evidence theory. Comput. Secur. 117: 102709 (2022) - [j7]Zhihong Zhou, Hu Bin, Jianhua Li, Ying Yin, Xiuzhen Chen, Jin Ma, Lihong Yao:
Malicious encrypted traffic features extraction model based on unsupervised feature adaptive learning. J. Comput. Virol. Hacking Tech. 18(4): 453-463 (2022) - 2020
- [j6]Xiao Yang, Mianxiong Dong, Xiuzhen Chen, Kaoru Ota:
Recommender System-Based Diffusion Inferring for Open Social Networks. IEEE Trans. Comput. Soc. Syst. 7(1): 24-34 (2020)
2010 – 2019
- 2019
- [j5]Lingyan Li, Xiaoyan Zhou, Yuan Zong, Wenming Zheng, Xiuzhen Chen, Jingang Shi, Peng Song:
Unsupervised Cross-Database Micro-Expression Recognition Using Target-Adapted Least-Squares Regression. IEICE Trans. Inf. Syst. 102-D(7): 1417-1421 (2019) - [j4]Xiuzhen Chen, Xiaoyan Zhou, Cheng Lu, Yuan Zong, Wenming Zheng, Chuangao Tang:
Target-Adapted Subspace Learning for Cross-Corpus Speech Emotion Recognition. IEICE Trans. Inf. Syst. 102-D(12): 2632-2636 (2019) - [c15]Xiao Yang, Xiuzhen Chen, Jin Ma, Shenghong Li:
An Information Diffusion Path Construction Algorithm Based on User Characteristics and Text Characteristics. ICMLC 2019: 1-7 - 2016
- [c14]Yue Lu, Xiuzhen Chen, Changsong Chen:
Security authentication mechanism based on symmetric polynomials for SCADA systems. SSIC 2016: 1-6 - 2015
- [c13]Youcef Begriche, Rida Khatoun, Lyes Khoukhi, Xiuzhen Chen:
Bayesian-based model for a reputation system in vehicular networks. SSIC 2015: 1-6 - [c12]Huangmiao Chen, Xiuzhen Chen, Lei Fan, Changsong Chen:
Classified security protection evaluation for vehicle information system. SSIC 2015: 1-6 - [c11]Marion Vasseur, Xiuzhen Chen, Rida Khatoun, Ahmed Serhrouchni:
Survey on packet marking fields and information for IP traceback. SSIC 2015: 1-8 - [c10]Yanan Wang, Xiuzhen Chen, Jianhua Li:
A new genetic-based rumor diffusion model for social networks. SSIC 2015: 1-5 - 2014
- [c9]Yanan Wang, Jianhua Li, Xiuzhen Chen, Wanyu Huang:
Multiple evidence fusion based information diffusion model for social network. ChinaCom 2014: 102-105 - [c8]Quan Zhou, Xiuzhen Chen, Changsong Chen:
Authoritative Scholarly Paper Recommendation Based on Paper Communities. CSE 2014: 1536-1540 - [c7]Mounira Msahli, Xiuzhen Chen, Ahmed Serhrouchni:
Towards a Fine-Grained Access Control for Cloud. ICEBE 2014: 286-291 - 2013
- [c6]Chenye Shi, Jianhua Li, Jieyuan Chen, Xiuzhen Chen:
Chinese SNS blog classification using semantic similarity. CASoN 2013: 1-6 - 2012
- [c5]Yuxin Zhao, Shenghong Li, Xiuzhen Chen:
Community Detection Using Label Propagation in Entropic Order. CIT 2012: 18-24 - [c4]Chungang Liu, Jianhua Li, Xiuzhen Chen:
Network Vulnerability Analysis Using Text Mining. ACIIDS (2) 2012: 274-283 - [c3]Xiuzhen Chen, Jianhua Li, Shenghong Li, Yanan Wang:
Hierarchical activeness state evaluation model for BBS network community. CHINACOM 2012: 206-211 - 2011
- [j3]Xiuzhen Chen, Shenghong Li, Jianhua Li, Zhiyuan Zhang:
Quantitative Similarity Evaluation of Internet Social Network Entities Based on Supernetwork. J. Comput. Networks Commun. 2011: 150762:1-150762:9 (2011) - [c2]Liangxiu Li, Shenghong Li, Xiuzhen Chen:
A new genetics-based diffusion model for social networks. CASoN 2011: 76-81 - 2010
- [c1]Jin Ma, Xiuzhen Chen, Jianhua Li:
An Approach to Privacy-Preserving Alert Correlation and Analysis. APSCC 2010: 620-624
2000 – 2009
- 2008
- [j2]Shaojun Zhang, Jianhua Li, Xiuzhen Chen, Lei Fan:
Building network attack graph for alert causal correlation. Comput. Secur. 27(5-6): 188-196 (2008) - [j1]Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan:
An OVAL-based active vulnerability assessment system for enterprise computer networks. Inf. Syst. Frontiers 10(5): 573-588 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-21 01:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint