default search action
Xin Su 0004
Person information
- affiliation: Hunan Police Academy, Key Laboratory of Network Investigational Technology / Key Laboratory of Network Crime Investigation, Changsha, China
- affiliation (former): Hunan University, College of Computer Science and Electronics Engineering, Changsha, China
Other persons with the same name
- Xin Su — disambiguation page
- Xin Su 0001 — Tsinghua University, TNList / RIIT, Beijing, China
- Xin Su 0002 — Hohai University, College of IOT Engineering, Changzhou Key Laboratory of Robotics and Intelligent Technology, China (and 2 more)
- Xin Su 0003 — Institut National de Recherche en Informatique et en Automatique, Rennes, France (and 1 more)
- Xin Su 0005 — Shandong University of Finance and Economics, Jinan, China
- Xin Su 0006 — Beijing University of Posts and Telecommunications, State Key Laboratory of Networking and Switching Technology, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Xiai Yan, Yao Yi, Weiqi Shi, Hua Tian, Xin Su:
Improvement of Web Semantic and Transformer-Based Knowledge Graph Completion in Low-Dimensional Spaces. Int. J. Semantic Web Inf. Syst. 20(1): 1-18 (2024) - 2023
- [c8]Yan Li, Xin Su, Xin Liu, He Yi Mu, Yi Zheng, Shuping Wang:
Research on Risk Assessment Model for Social High-Risk Individuals Based on Graph Attention Network. CSCloud/EdgeCom 2023: 91-95 - 2022
- [j12]Tianyuan Li, Xin Su, Wei Liu, Wei Liang, Meng-Yen Hsieh, Zhuhui Chen, Xuchong Liu, Hong Zhang:
Memory-augmented meta-learning on meta-path for fast adaptation cold-start recommendation. Connect. Sci. 34(1): 301-318 (2022) - [c7]Wei Zhao, Wenjie Kang, Xuchong Liu, Xin Su, Yue Zhang, Hao Jiang:
Social Relationship Mining Based on User Telephone Communication Data for Cooperative Relationship Recommendation. INFOCOM Workshops 2022: 1-6 - 2021
- [j11]Jing Long, Xin Su:
Anonymous chaotic-based identity authentication protocol in IoT. Int. J. Embed. Syst. 14(2): 194-200 (2021) - 2020
- [j10]Xin Su, Qingbo Gong, Yi Zheng, Xuchong Liu, Kuan-Ching Li:
An Informative and Comprehensive Behavioral Characteristics Analysis Methodology of Android Application for Data Security in Brain-Machine Interfacing. Comput. Math. Methods Medicine 2020: 3658795:1-3658795:14 (2020) - [j9]Zhenyu Liu, Xin Su, Dafang Zhang, Jing Long:
A robust error control coding-based watermarking algorithm for FPGA IP protection. Int. J. Embed. Syst. 13(2): 209-220 (2020) - [j8]Xin Su, Weiqi Shi, Xilong Qu, Yi Zheng, Xuchong Liu:
DroidDeep: using Deep Belief Network to characterize and detect android malware. Soft Comput. 24(8): 6017-6030 (2020)
2010 – 2019
- 2019
- [j7]Xin Su, Yi Zheng, Jiuchuan Lin, Xuchong Liu:
A network traffic-aware mobile application recommendation system based on network traffic cost consideration. Int. J. Comput. Sci. Eng. 19(2): 259-273 (2019) - 2018
- [c6]Xin Su, Weiqi Shi, Jiuchuan Lin, Xin Wang:
Mass Discovery of Android Malware Behavioral Characteristics for Detection Consideration. ICCCS (3) 2018: 101-112 - 2017
- [j6]Shiming He, Weini Zeng, Kun Xie, Hongming Yang, Mingyong Lai, Xin Su:
PPNC: Privacy Preserving Scheme for Random Linear Network Coding in Smart Grid. KSII Trans. Internet Inf. Syst. 11(3): 1510-1532 (2017) - [j5]Xin Su, Xuchong Liu, Jiuchuan Lin, Shiming He, Zhangjie Fu, Wenjia Li:
De-cloaking Malicious Activities in Smartphones Using HTTP Flow Mining. KSII Trans. Internet Inf. Syst. 11(6): 3230-3253 (2017) - [j4]Xin Wang, Dafang Zhang, Xin Su, Wenjia Li:
Mlifdect: Android Malware Detection Based on Parallel Machine Learning and Information Fusion. Secur. Commun. Networks 2017: 6451260:1-6451260:14 (2017) - [c5]Xin Su, Xuchong Liu, Jiuchuan Lin, Yu Tong:
An Android App Recommendation Approach by Merging Network Traffic Cost. ICCCS (1) 2017: 326-338 - [c4]Meiqi Lin, Dafang Zhang, Xin Su, Tinghao Yu:
Effective and scalable repackaged application detection based on user interface. INFOCOM Workshops 2017: 1-6 - 2016
- [j3]Xin Su, Dafang Zhang, Shuaifu Dai, Jianyu Zhang, Duanbin Wang:
Mobile traffic identification based on application's network signature. Int. J. Embed. Syst. 8(2/3): 217-227 (2016) - [c3]Xin Su, Dafang Zhang, Wenjia Li, Kai Zhao:
A Deep Learning Approach to Android Malware Feature Learning and Detection. Trustcom/BigDataSE/ISPA 2016: 244-251 - 2015
- [j2]Xueping Wu, Dafang Zhang, Xin Su, Wenwei Li:
Detect repackaged Android application based on HTTP traffic similarity. Secur. Commun. Networks 8(13): 2257-2266 (2015) - [j1]Xin Su, Dafang Zhang, Wenjia Li, Xiaofei Wang:
AndroGenerator: An automated and configurable android app network traffic generation system. Secur. Commun. Networks 8(18): 4273-4288 (2015) - [c2]Kai Zhao, Dafang Zhang, Xin Su, Wenjia Li:
Fest: A feature extraction and selection tool for Android malware detection. ISCC 2015: 714-720 - [c1]Xin Su, Dafang Zhang, Wenjia Li, Wenwei Li:
Android app recommendation approach based on network traffic measurement and analysis. ISCC 2015: 988-994
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint