default search action
Chao Chen 0015
Person information
- affiliation: RMIT University, Melbourne, VIC, Australia
- affiliation (former): James Cook University, Townsville, QLD, Australia
- affiliation (former): Swinburne University of Technology, School of Software and Electrical Engineering, Hawthorn, VIC, Australia
- affiliation (former): Deakin University, Geelong, Australia
Other persons with the same name
- Chao Chen — disambiguation page
- Chao Chen 0001
— Indiana University - Purdue University Fort Wayne, Department of Engineering, IN, USA
- Chao Chen 0002
— Chinese Academy of Sciences, Key Laboratory of Electromagnetic Radiation and Sensing Technology, Beijing, China
- Chao Chen 0003
— Freescale Semiconductor, Inc., Austin, TX, USA (and 1 more)
- Chao Chen 0004
— Chongqing University, College of Computer Science, China (and 4 more)
- Chao Chen 0005
— Zhejiang Gongshang University, School of Information and Electronic Engineering, Hangzhou, China (and 1 more)
- Chao Chen 0006 — Qualcomm Incorporated, San Diego, CA, USA (and 1 more)
- Chao Chen 0007
— University of Nottingham, School of Computer Science, UK
- Chao Chen 0008
— North Carolina State University, Raleigh, NC, USA (and 2 more)
- Chao Chen 0009
— Qilu University of Technology (Shandong Academy of Sciences), Shandong Artificial Intelligence Institute, Jinan, China (and 1 more)
- Chao Chen 0010 — Shandong Normal University, School of Management Science and Engineering, China
- Chao Chen 0011 — University of Warwick, Coventry, UK
- Chao Chen 0012
— Stony Brook University, Stony Brook, NY, USA
- Chao Chen 0013
— Xidian University, Xi'an, China
- Chao Chen 0014 — University of Miami, Coral Gables, FL, USA
- Chao Chen 0016
— Shanghai Jiao Tong University, China (and 2 more)
- Chao Chen 0017
— National University of Defense Technology, College of System Engineering, Changsha, China
- Chao Chen 0018 — Southeast University, National ASIC Research Center, Nanjing, China
- Chao Chen 0019
— Butterfly Network Inc., Guilford, CT, USA (and 1 more)
- Chao Chen 0020 — University of Florida, Department of Computer and Information Sciences and Engineering, Gainesville, FL, USA
- Chao Chen 0021 — Fortiss GmbH, affiliated institute of Technische Universität München, Munich, Germany
- Chao Chen 0022
— Shenzhen Institutes of Advanced Technology (SIAT), CAS, China
- Chao Chen 0023
— Delft University of Technology, Faculty of Technology, Policy and Management, The Netherlands (and 1 more)
- Chao Chen 0024
— Georgia Institute of Technology, Atlanta, GA, USA
- Chao Chen 0025 — Beihang University, Beijing, China
- Chao Chen 0026
— DAMO Academy, Alibaba Group, China (and 1 more)
- Chao Chen 0027
— National University of Defense Technology, College of System Engineering, Changsha, China
- Chao Chen 0028
— Nanjing University, Nanjing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j36]Bonan Zhang
, Chao Chen, Ickjai Lee, Kyungmi Lee, Kok-Leong Ong:
A survey on security and privacy issues in wearable health monitoring devices. Comput. Secur. 155: 104453 (2025) - [j35]Bonan Zhang
, Lin Li
, Chao Chen
, Ickjai Lee
, Kyungmi Lee, Tianqing Zhu, Kok-Leong Ong:
A novel dictionary attack on ECG authentication system using adversarial optimization and clustering. Knowl. Based Syst. 316: 113326 (2025) - [j34]Jiaheng Wei, Yanjun Zhang, Leo Yu Zhang, Chao Chen, Shirui Pan, Kok-Leong Ong, Jun Zhang, Yang Xiang:
Extracting Private Training Data in Federated Learning From Clients. IEEE Trans. Inf. Forensics Secur. 20: 4525-4540 (2025) - 2024
- [j33]Weizhi Meng, Sokratis K. Katsikas, Jiageng Chen, Chao Chen:
Security, Privacy, and Trust Management on Decentralized Systems and Networks. Int. J. Netw. Manag. 34(6) (2024) - [j32]Xinbo Ban
, Ming Ding
, Shigang Liu
, Chao Chen
, Jun Zhang
:
IoTFuzz: Automated Discovery of Violations in Smart Homes With Real Environment. IEEE Internet Things J. 11(6): 10183-10196 (2024) - [j31]Hanyang Liu, Yong Wang
, Zhiqiang Zhang
, Jiangzhou Deng, Chao Chen
, Leo Yu Zhang
:
Matrix factorization recommender based on adaptive Gaussian differential privacy for implicit feedback. Inf. Process. Manag. 61(4): 103720 (2024) - [j30]Xiaoyu Zhang
, Shen Lin
, Chao Chen
, Xiaofeng Chen
:
MODA: Model Ownership Deprivation Attack in Asynchronous Federated Learning. IEEE Trans. Dependable Secur. Comput. 21(4): 4220-4235 (2024) - [j29]Zeming Yao
, Hangtao Zhang
, Yicheng Guo
, Xin Tian
, Wei Peng
, Yi Zou
, Leo Yu Zhang
, Chao Chen
:
Reverse Backdoor Distillation: Towards Online Backdoor Attack Detection for Deep Neural Network Models. IEEE Trans. Dependable Secur. Comput. 21(6): 5098-5111 (2024) - [j28]Wanlun Ma
, Derui Wang
, Chao Chen
, Sheng Wen
, Gaolei Fei
, Yang Xiang
:
LocGuard: A Location Privacy Defender for Image Sharing. IEEE Trans. Dependable Secur. Comput. 21(6): 5526-5537 (2024) - [c34]Zhaoxi Zhang, Xiaomei Zhang, Yanjun Zhang, Leo Yu Zhang, Chao Chen, Shengshan Hu, Asif Gill
, Shirui Pan:
Stealing Watermarks of Large Language Models via Mixed Integer Programming. ACSAC 2024: 46-60 - [c33]Bonan Zhang
, Chao Chen
, Ickjai Lee
, Kyungmi Lee
, Kok-Leong Ong
:
Exploring the Vulnerability of ECG-Based Authentication Systems Through A Dictionary Attack Approach. ICA3PP (6) 2024: 141-158 - [c32]Hangtao Zhang, Shengshan Hu, Yichen Wang, Leo Yu Zhang, Ziqi Zhou, Xianlong Wang, Yanjun Zhang, Chao Chen:
Detector Collapse: Backdooring Object Detection to Catastrophic Overload or Blindness in the Physical World. IJCAI 2024: 1670-1678 - [c31]Bonan Zhang, Chao Chen, Ickjai Lee, Kyungmi Lee, Kok-Leong Ong:
Clustering-based Evaluation Framework of Feature Extraction Approaches for ECG Biometric Authentication. IJCNN 2024: 1-9 - [c30]Shigang Liu
, Lin Li
, Xinbo Ban, Chao Chen, Jun Zhang, Seyit Camtepe, Yang Xiang:
Automatic Software Vulnerability Detection in Binary Code. ML4CS 2024: 148-166 - [c29]Zian Liu, Shigang Liu, Lei Pan, Chao Chen, Ejaz Ahmed, Jun Zhang, Dongxi Liu:
VulMatch: Binary-Level Vulnerability Detection Through Signature. NSS 2024: 409-427 - [c28]Zeming Yao
, Lin Li
, Leo Yu Zhang
, Fusen Guo
, Chao Chen
, Jun Zhang
:
Deceptive Waves: Embedding Malicious Backdoors in PPG Authentication. WISE (2) 2024: 258-272 - [e4]Dan Dongseong Kim
, Chao Chen
:
Machine Learning for Cyber Security - 5th International Conference, ML4CS 2023, Yanuca Island, Fiji, December 4-6, 2023, Proceedings. Lecture Notes in Computer Science 14541, Springer 2024, ISBN 978-981-97-2457-4 [contents] - [i18]Hangtao Zhang, Shengshan Hu, Yichen Wang, Leo Yu Zhang, Ziqi Zhou, Xianlong Wang, Yanjun Zhang, Chao Chen:
Detector Collapse: Backdooring Object Detection to Catastrophic Overload or Blindness. CoRR abs/2404.11357 (2024) - [i17]Zhaoxi Zhang, Xiaomei Zhang, Yanjun Zhang, Leo Yu Zhang, Chao Chen, Shengshan Hu, Asif Gill, Shirui Pan:
Large Language Model Watermark Stealing With Mixed Integer Programming. CoRR abs/2405.19677 (2024) - [i16]Jiaheng Wei, Yanjun Zhang, Leo Yu Zhang, Ming Ding, Chao Chen, Kok-Leong Ong, Jun Zhang, Yang Xiang:
Memorization in deep learning: A survey. CoRR abs/2406.03880 (2024) - 2023
- [j27]Jingjin Li
, Chao Chen
, Mostafa Rahimi Azghadi, Hossein Ghodosi, Lei Pan
, Jun Zhang:
Security and privacy problems in voice assistant applications: A survey. Comput. Secur. 134: 103448 (2023) - [j26]Lin Li
, Chao Chen, Lei Pan, Leo Yu Zhang, Zhifeng Wang, Jun Zhang, Yang Xiang:
A Survey of PPG's Application in Authentication. Comput. Secur. 135: 103488 (2023) - [j25]Xiaoyu Zhang, Chao Chen, Yi Xie, Xiaofeng Chen, Jun Zhang, Yang Xiang:
A survey on privacy inference attacks and defenses in cloud-based Deep Neural Network. Comput. Stand. Interfaces 83: 103672 (2023) - [j24]Huacheng Li, Chunhe Xia, Tianbo Wang, Sheng Wen, Chao Chen, Yang Xiang:
Capturing Dynamics of Information Diffusion in SNS: A Survey of Methodology and Techniques. ACM Comput. Surv. 55(2): 22:1-22:51 (2023) - [j23]Weizhi Meng
, Sokratis K. Katsikas, Jiageng Chen, Chao Chen:
Editorial for special issue on security and trust on networked systems. Int. J. Netw. Manag. 33(3) (2023) - [j22]Gaolei Fei
, Yong Cheng, Wanlun Ma
, Chao Chen
, Sheng Wen
, Guangmin Hu:
Real-Time Detection of COVID-19 Events From Twitter: A Spatial-Temporally Bursty-Aware Method. IEEE Trans. Comput. Soc. Syst. 10(2): 656-672 (2023) - [j21]Chuan Xu
, Yingyi Ding, Chao Chen
, Yong Ding
, Wei Zhou
, Sheng Wen
:
Personalized Location Privacy Protection for Location-Based Services in Vehicular Networks. IEEE Trans. Intell. Transp. Syst. 24(1): 1163-1177 (2023) - [c27]Zian Liu
, Chao Chen
, Ejaz Ahmed
, Jun Zhang
, Dongxi Liu
:
WinkFuzz: Model-based Script Synthesis for Fuzzing. ASSS@AsiaCCS 2023: 2:1-2:12 - [c26]Lin Li
, Chao Chen, Lei Pan, Yonghang Tai, Jun Zhang, Yang Xiang:
Hiding Your Signals: A Security Analysis of PPG-Based Biometric Authentication. ESORICS (3) 2023: 183-202 - [c25]Hangtao Zhang
, Zeming Yao
, Leo Yu Zhang, Shengshan Hu, Chao Chen, Alan Wee-Chung Liew
, Zhetao Li:
Denial-of-Service or Fine-Grained Control: Towards Flexible Model Poisoning Attacks on Federated Learning. IJCAI 2023: 4567-4575 - [c24]Lin Li
, Chao Chen, Lei Pan, Jun Zhang, Yang Xiang:
SigD: A Cross-Session Dataset for PPG-based User Authentication in Different Demographic Groups. IJCNN 2023: 1-8 - [c23]Andrew Plapp
, Jianzhang Wu, Lei Pan, Chao Chen, Caslon Chua
, Jun Zhang:
Strengthening Cyber Security Education: Designing Robust Assessments for ChatGPT-Generated Answers. ML4CS 2023: 17-27 - [c22]Lin Li
, Chao Chen
, Lei Pan
, Leo Yu Zhang
, Jun Zhang
, Yang Xiang
:
SigA: rPPG-based Authentication for Virtual Reality Head-mounted Display. RAID 2023: 686-699 - [e3]Moti Yung
, Chao Chen
, Weizhi Meng
:
Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings. Lecture Notes in Computer Science 14299, Springer 2023, ISBN 978-3-031-45932-0 [contents] - [i15]Jingjin Li, Chao Chen, Lei Pan, Mostafa Rahimi Azghadi, Hossein Ghodosi, Jun Zhang:
Security and Privacy Problems in Voice Assistant Applications: A Survey. CoRR abs/2304.09486 (2023) - [i14]Hangtao Zhang, Zeming Yao, Leo Yu Zhang, Shengshan Hu, Chao Chen, Alan Wee-Chung Liew, Zhetao Li:
Denial-of-Service or Fine-Grained Control: Towards Flexible Model Poisoning Attacks on Federated Learning. CoRR abs/2304.10783 (2023) - [i13]Zian Liu, Lei Pan, Chao Chen, Ejaz Ahmed, Shigang Liu, Jun Zhang, Dongxi Liu:
VulMatch: Binary-level Vulnerability Detection Through Signature. CoRR abs/2308.00288 (2023) - [i12]Zian Liu, Zhi Zhang, Siqi Ma
, Dongxi Liu, Jun Zhang, Chao Chen, Shigang Liu, Muhammad Ejaz Ahmed, Yang Xiang:
SemDiff: Binary Similarity Detection by Diffing Key-Semantics Graphs. CoRR abs/2308.01463 (2023) - [i11]Zian Liu, Chao Chen, Muhammad Ejaz Ahmed, Jun Zhang, Dongxi Liu:
model-based script synthesis for fuzzing. CoRR abs/2308.04115 (2023) - [i10]Jiaheng Wei, Yanjun Zhang, Leo Yu Zhang, Chao Chen, Shirui Pan, Kok-Leong Ong, Jun Zhang, Yang Xiang:
Client-side Gradient Inversion Against Federated Learning from Poisoning. CoRR abs/2309.07415 (2023) - 2022
- [j20]Xiangyu Hu
, Wanlun Ma, Chao Chen
, Sheng Wen, Jun Zhang
, Yang Xiang
, Gaolei Fei:
Event detection in online social network: Methodologies, state-of-art, and evolution. Comput. Sci. Rev. 46: 100500 (2022) - [j19]Yuantian Miao, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, Yang Xiang
:
Machine Learning-based Cyber Attacks Targeting on Controlled Information: A Survey. ACM Comput. Surv. 54(7): 139:1-139:36 (2022) - [j18]Jun Zhang, Lei Pan, Qing-Long Han, Chao Chen, Sheng Wen, Yang Xiang
:
Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey. IEEE CAA J. Autom. Sinica 9(3): 377-391 (2022) - [j17]Xiaonan Li
, Hossein Ghodosi, Chao Chen, Mangalam Sankupellay, Ickjai Lee
:
Improving Network-Based Anomaly Detection in Smart Home Environment. Sensors 22(15): 5626 (2022) - [j16]Wanlun Ma, Xiangyu Hu, Chao Chen, Sheng Wen
, Kim-Kwang Raymond Choo
, Yang Xiang
:
Social Media Event Prediction using DNN with Feedback Mechanism. ACM Trans. Manag. Inf. Syst. 13(3): 33:1-33:24 (2022) - [c21]Lin Li
, Chao Chen, Lei Pan, Jun Zhang, Yang Xiang:
Video is All You Need: Attacking PPG-based Biometric Authentication. AISec@CCS 2022: 57-66 - [c20]Zian Liu, Chao Chen, Leo Yu Zhang, Shang Gao:
Working Mechanism of Eternalblue and Its Application in Ransomworm. CSS 2022: 178-191 - [c19]Yuantian Miao, Chao Chen, Lei Pan, Shigang Liu, Seyit Camtepe, Jun Zhang, Yang Xiang:
No-Label User-Level Membership Inference for ASR Model Auditing. ESORICS (2) 2022: 610-628 - [c18]Zian Liu, Chao Chen, Ejaz Ahmed, Dongxi Liu, Jun Zhang:
Automated Binary Analysis: A Survey. ICA3PP 2022: 392-411 - [c17]Xinbo Ban
, Ming Ding
, Shigang Liu
, Chao Chen
, Jun Zhang
:
A Survey on IoT Vulnerability Discovery. NSS 2022: 267-282 - [i9]Lin Li, Chao Chen, Lei Pan, Jun Zhang, Yang Xiang:
SoK: An Overview of PPG's Application in Authentication. CoRR abs/2201.11291 (2022) - [i8]Yuantian Miao, Chao Chen, Lei Pan, Jun Zhang, Yang Xiang:
FAAG: Fast Adversarial Audio Generation through Interactive Attack Optimisation. CoRR abs/2202.05416 (2022) - [i7]Lin Li, Chao Chen, Lei Pan, Jun Zhang, Yang Xiang:
Video is All You Need: Attacking PPG-based Biometric Authentication. CoRR abs/2203.00928 (2022) - [i6]Lin Li, Chao Chen, Lei Pan, Yonghang Tai, Jun Zhang, Yang Xiang:
Hiding Your Signals: A Security Analysis of PPG-based Biometric Authentication. CoRR abs/2207.04434 (2022) - 2021
- [j15]Yuantian Miao, Minhui Xue, Chao Chen, Lei Pan, Jun Zhang, Benjamin Zi Hao Zhao, Dali Kaafar, Yang Xiang:
The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services. Proc. Priv. Enhancing Technol. 2021(1): 209-228 (2021) - [c16]Bonan Zhang, Jingjin Li, Chao Chen, Kyungmi Lee, Ickjai Lee:
A Practical Botnet Traffic Detection System Using GNN. CSS 2021: 66-78 - [c15]Xinbo Ban
, Ming Ding
, Shigang Liu
, Chao Chen
, Jun Zhang
, Yang Xiang
:
TAESim: A Testbed for IoT Security Analysis of Trigger-Action Environment. CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 218-237 - [e2]Min Yang
, Chao Chen
, Yang Liu
:
Network and System Security - 15th International Conference, NSS 2021, Tianjin, China, October 23, 2021, Proceedings. Lecture Notes in Computer Science 13041, Springer 2021, ISBN 978-3-030-92707-3 [contents] - [i5]Yuantian Miao, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, Yang Xiang:
Machine Learning Based Cyber Attacks Targeting on Controlled Information: A Survey. CoRR abs/2102.07969 (2021) - [i4]Xiaoyu Zhang, Chao Chen, Yi Xie, Xiaofeng Chen, Jun Zhang, Yang Xiang:
Privacy Inference Attacks and Defenses in Cloud-based Deep Neural Network: A Survey. CoRR abs/2105.06300 (2021) - [i3]Ning Xi, Chao Chen, Jun Zhang, Cong Sun, Shigang Liu, Pengbin Feng, Jianfeng Ma:
Information flow based defensive chain for data leakage detection and prevention: a survey. CoRR abs/2106.04951 (2021) - [i2]Huacheng Li, Chunhe Xia, Tianbo Wang, Sheng Wen, Chao Chen, Yang Xiang:
Capturing Dynamics of Information Diffusion in SNS: A Survey of Methodology and Techniques. CoRR abs/2110.14245 (2021) - 2020
- [j14]Shigang Liu
, Mahdi Dibaei
, Yonghang Tai, Chao Chen
, Jun Zhang
, Yang Xiang
:
Cyber Vulnerability Intelligence for Internet of Things Binary. IEEE Trans. Ind. Informatics 16(3): 2154-2163 (2020) - [c14]Liu Liu, Chao Chen, Jun Zhang, Olivier Y. de Vel, Yang Xiang
:
Doc2vec-based Insider Threat Detection through Behaviour Analysis of Multi-source Security Logs. TrustCom 2020: 301-309 - [e1]Miroslaw Kutylowski
, Jun Zhang
, Chao Chen
:
Network and System Security - 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25-27, 2020, Proceedings. Lecture Notes in Computer Science 12570, Springer 2020, ISBN 978-3-030-65744-4 [contents]
2010 – 2019
- 2019
- [j13]Liu Liu
, Chao Chen
, Jun Zhang
, Olivier Y. de Vel
, Yang Xiang
:
Insider Threat Identification Using the Simultaneous Neural Learning of Multi-Source Logs. IEEE Access 7: 183162-183176 (2019) - [j12]Xinbo Ban, Shigang Liu, Chao Chen
, Caslon Chua
:
A performance evaluation of deep-learnt features for software vulnerability detection. Concurr. Comput. Pract. Exp. 31(19) (2019) - [c13]Liu Liu, Chao Chen
, Jun Zhang, Olivier Y. de Vel, Yang Xiang
:
Unsupervised Insider Detection Through Neural Feature Learning and Model Optimisation. NSS 2019: 18-36 - [c12]Zian Liu, Chao Chen, Shigang Liu, Dongxi Liu, Yu Wang:
Exploit in Smart Devices: A Case Study. SocialSec 2019: 152-164 - [i1]Yuantian Miao, Benjamin Zi Hao Zhao, Minhui Xue, Chao Chen, Lei Pan, Jun Zhang, Dali Kaafar, Yang Xiang:
The Audio Auditor: Participant-Level Membership Inference in Voice-Based IoT. CoRR abs/1905.07082 (2019) - 2018
- [c11]Liu Liu
, Olivier Y. de Vel, Chao Chen, Jun Zhang, Yang Xiang:
Anomaly-Based Insider Threat Detection Using Deep Autoencoders. ICDM Workshops 2018: 39-48 - [c10]Xinbo Ban, Chao Chen, Shigang Liu, Yu Wang, Jun Zhang:
Deep-learnt features for Twitter spam detection. SocialSec 2018: 22-26 - 2017
- [j11]Shigang Liu, Yu Wang
, Jun Zhang
, Chao Chen, Yang Xiang:
Addressing the class imbalance problem in Twitter spam detection using ensemble learning. Comput. Secur. 69: 35-49 (2017) - [j10]Chao Chen, Sheng Wen
, Jun Zhang
, Yang Xiang, Jonathan J. Oliver, Abdulhameed Alelaiwi, Mohammad Mehedi Hassan:
Investigating the deceptive information in Twitter spam. Future Gener. Comput. Syst. 72: 319-326 (2017) - [j9]Hancong Duan, Chao Chen, Geyong Min, Yu Wu:
Energy-aware scheduling of virtual machines in heterogeneous cloud computing systems. Future Gener. Comput. Syst. 74: 142-150 (2017) - [j8]Chao Chen, Yu Wang
, Jun Zhang
, Yang Xiang, Wanlei Zhou
, Geyong Min
:
Statistical Features-Based Real-Time Detection of Drifted Twitter Spam. IEEE Trans. Inf. Forensics Secur. 12(4): 914-925 (2017) - 2016
- [j7]Chao Chen, Jun Zhang
, Yang Xiang, Wanlei Zhou
, Jonathan J. Oliver:
Spammers Are Becoming "Smarter" on Twitter. IT Prof. 18(2): 66-70 (2016) - [j6]Chao Chen, Jun Zhang
, Yi Xie, Yang Xiang, Wanlei Zhou
, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi:
Comments and Corrections. IEEE Trans. Comput. Soc. Syst. 3(1): 42 (2016) - [c9]Shigang Liu, Yu Wang
, Chao Chen, Yang Xiang:
An Ensemble Learning Approach for Addressing the Class Imbalance Problem in Twitter Spam Detection. ACISP (1) 2016: 215-228 - [c8]Bailin Xie, Yu Wang
, Chao Chen, Yang Xiang:
Gatekeeping Behavior Analysis for Information Credibility Assessment on Weibo. NSS 2016: 483-496 - 2015
- [j5]Sheng Wen
, Mohammad Sayad Haghighi
, Chao Chen, Yang Xiang
, Wanlei Zhou
, Weijia Jia
:
A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks. IEEE Trans. Computers 64(3): 640-653 (2015) - [j4]Chao Chen, Jun Zhang, Yi Xie, Yang Xiang, Wanlei Zhou
, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi, Majed A. AlRubaian:
A Performance Evaluation of Machine Learning-Based Streaming Spam Tweets Detection. IEEE Trans. Comput. Soc. Syst. 2(3): 65-76 (2015) - [c7]Chao Chen, Jun Zhang
, Xiao Chen
, Yang Xiang
, Wanlei Zhou
:
6 million spam tweets: A large ground truth for timely Twitter spam detection. ICC 2015: 7065-7070 - [c6]Chao Chen, Jun Zhang
, Yang Xiang
, Wanlei Zhou
:
Asymmetric self-learning for tackling Twitter Spam Drift. INFOCOM Workshops 2015: 208-213 - [c5]Yu Wang
, Chao Chen, Yang Xiang:
Unknown pattern extraction for statistical network protocol identification. LCN 2015: 506-509 - 2014
- [c4]Di Wu
, Xiao Chen
, Chao Chen, Jun Zhang, Yang Xiang, Wanlei Zhou
:
On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classification. NSS 2014: 138-151 - 2013
- [j3]Jun Zhang
, Chao Chen, Yang Xiang
, Wanlei Zhou
, Yong Xiang:
Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions. IEEE Trans. Inf. Forensics Secur. 8(1): 5-15 (2013) - [j2]Jun Zhang
, Chao Chen, Yang Xiang
, Wanlei Zhou
, Athanasios V. Vasilakos
:
An Effective Network Traffic Classification Method with Unknown Flow Detection. IEEE Trans. Netw. Serv. Manag. 10(2): 133-147 (2013) - [c3]Jun Zhang
, Chao Chen, Yang Xiang
, Wanlei Zhou
:
Robust network traffic identification with unknown applications. AsiaCCS 2013: 405-414 - 2012
- [j1]Jun Zhang
, Chao Chen, Yang Xiang
, Wanlei Zhou
:
Semi-supervised and compound classification of network traffic. Int. J. Secur. Networks 7(4): 252-261 (2012) - [c2]Jun Zhang
, Chao Chen, Yang Xiang
, Wanlei Zhou
:
Semi-supervised and Compound Classification of Network Traffic. ICDCS Workshops 2012: 617-621 - [c1]Jun Zhang
, Chao Chen, Yang Xiang
, Wanlei Zhou
:
Classification of Correlated Internet Traffic Flows. TrustCom 2012: 490-496
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-06-21 00:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint