default search action
Xunxun Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Rui He, Zehua Fu, Qingjie Liu, Yunhong Wang, Xunxun Chen:
Learning group interaction for sports video understanding from a perspective of athlete. Frontiers Comput. Sci. 18(4) (2024) - 2023
- [c19]Lingfeng Tan, Yunhong Wang, Junfu Wang, Liang Yang, Xunxun Chen, Yuanfang Guo:
Deepfake Video Detection via Facial Action Dependencies Estimation. AAAI 2023: 5276-5284 - [c18]Xiaoqing Ma, Chao Zheng, Zhao Li, Jiangyi Yin, Qingyun Liu, Xunxun Chen:
Detecting Fake-Normal Pornographic and Gambling Websites through one Multi-Attention HGNN. CSCWD 2023: 1741-1747 - 2022
- [j5]Yuwei Zeng, Zhicheng Liu, Xunxun Chen, Tianning Zang:
Hidden Path: Understanding the Intermediary in Malicious Redirections. IEEE Trans. Inf. Forensics Secur. 17: 1725-1740 (2022) - [c17]Rui He, Zehua Fu, Qingjie Liu, Yunhong Wang, Xunxun Chen:
D3: Duplicate Detection Decontaminator for Multi-Athlete Tracking in Sports Videos. ACCV (7) 2022: 467-484 - [c16]Heng Bao, Lirui Deng, Jiazhi Guan, Liang Zhang, Xunxun Chen:
Improving Deepfake Video Detection with Comprehensive Self-consistency Learning. CNCERT 2022: 151-161 - [c15]Rui He, Zehua Fu, Qingjie Liu, Yunhong Wang, Xunxun Chen:
Sparse Relation Graph for Group Activity Recognition. MMSP 2022: 1-5 - [c14]Xiaoqing Ma, Chao Zheng, Zhao Li, Jiangyi Yin, Qingyun Liu, Xunxun Chen:
A Lightweight Graph-based Method to Detect Pornographic and Gambling Websites with Imperfect Datasets. TrustCom 2022: 291-298 - [i1]Rui He, Zehua Fu, Qingjie Liu, Yunhong Wang, Xunxun Chen:
D$^{\bf{3}}$: Duplicate Detection Decontaminator for Multi-Athlete Tracking in Sports Videos. CoRR abs/2209.12248 (2022) - 2021
- [j4]Yuwei Zeng, Xiaochun Yun, Xunxun Chen, Boquan Li, Haiwei Tsang, Yipeng Wang, Tianning Zang, Yongzheng Zhang:
Finding disposable domain names: A linguistics-based stacking approach. Comput. Networks 184: 107642 (2021) - [j3]Minglai Shao, Jianxin Li, Yue Chang, Jun Zhao, Xunxun Chen:
MASA: An efficient framework for anomaly detection in multi-attributed networks. Comput. Secur. 102: 102085 (2021) - [j2]Minglai Shao, Jianxin Li, Qiben Yan, Feng Chen, Hongyi Huang, Xunxun Chen:
Structured Sparsity Model Based Trajectory Tracking Using Private Location Data Release. IEEE Trans. Dependable Secur. Comput. 18(6): 2983-2995 (2021) - [c13]Xiaoqing Ma, Chao Zheng, Zhao Li, Qingyun Liu, Xunxun Chen:
CDNFinder: Detecting CDN-hosted Nodes by Graph-Based Semi-Supervised Classification. ISCC 2021: 1-7 - [c12]Yuwei Zeng, Xunxun Chen, Tianning Zang, Haiwei Tsang:
Winding Path: Characterizing the Malicious Redirection in Squatting Domain Names. PAM 2021: 93-107
2010 – 2019
- 2019
- [c11]Yuwei Zeng, Tianning Zang, Yongzheng Zhang, Xunxun Chen, Yipeng Wang:
A Comprehensive Measurement Study of Domain-Squatting Abuse. ICC 2019: 1-6 - [c10]Yuwei Zeng, Yongzheng Zhang, Tianning Zang, Xunxun Chen, Yipeng Wang:
A Linguistics-based Stacking Approach to Disposable Domains Detection. ICNP 2019: 1-4 - [c9]Zhenyu Cheng, Xunxun Chen, Yongzheng Zhang, Shuhao Li, Jian Xu:
MURITE-Detector: Identifying User-Role in Information Theft Events of Mobile Network. TrustCom/BigDataSE 2019: 232-239 - 2018
- [c8]Zhenyu Cheng, Xunxun Chen, Yongzheng Zhang, Shuhao Li, Jian Xu:
MUI-defender: CNN-Driven, Network Flow-Based Information Theft Detection for Mobile Users. CollaborateCom 2018: 329-345 - [c7]Minglai Shao, Jianxin Li, Feng Chen, Xunxun Chen:
An Efficient Framework for Detecting Evolving Anomalous Subgraphs in Dynamic Networks. INFOCOM 2018: 2258-2266 - 2017
- [c6]Wenting Zhao, Yunhong Wang, Xunxun Chen, Yuanyan Tang, Qingjie Liu:
Learning Deep Feature Fusion for Group Images Classification. CCCV (2) 2017: 566-576 - [c5]Zhenyu Cheng, Xunxun Chen, Yongzheng Zhang, Shuhao Li, Yafei Sang:
Detecting Information Theft Based on Mobile Network Flows for Android Users. NAS 2017: 1-10 - [c4]Minglai Shao, Jianxin Li, Feng Chen, Hongyi Huang, Shuai Zhang, Xunxun Chen:
An Efficient Approach to Event Detection and Forecasting in Dynamic Multivariate Social Media Networks. WWW 2017: 1631-1639 - 2014
- [j1]Bo Wang, Xunxun Chen, Weiling Chang:
A light-weight trust-based QoS routing algorithm for ad hoc networks. Pervasive Mob. Comput. 13: 164-180 (2014) - 2012
- [c3]Bo Wang, Xunxun Chen, Weiling Chang:
An efficient trust-based opportunistic routing for ad hoc networks. WCSP 2012: 1-7 - [c2]Xunxun Chen, Wei Wang, Dapeng Man, Shichang Xuan:
A Webpage Deletion Algorithm Based on Hierarchical Filtering. WISM 2012: 551-557
2000 – 2009
- 2005
- [c1]Xunxun Chen, Binxing Fang, Lei Li, Yu Jiang:
WM+: An Optimal Multi-pattern String Matching Algorithm Based on the WM Algorithm. APPT 2005: 515-523
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-02 19:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint