Seguir
Chao Chen
Título
Citado por
Citado por
Año
Deep learning based attack detection for cyber-physical system cybersecurity: A survey
J Zhang, L Pan, QL Han, C Chen, S Wen, Y Xiang
IEEE/CAA Journal of Automatica Sinica 9 (3), 377-391, 2021
2342021
Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions
J Zhang, C Chen, Y Xiang, W Zhou
IEEE Transactions on Information Forensics and Security 8 (1), 5-15, 2013
2272013
Statistical Features Based Real-time Detection of Drifted Twitter Spam
C Chen, Y Wang, J Zhang, Y Xiang, W Zhou, GY Min
IEEE Transactions on Information Forensics and Security 12 (4), 914 - 925, 2017
1902017
A sword with two edges: Propagation studies on both positive and negative information in online social networks
S Wen, M Haghighi, C Chen, Y Xiang, W Zhou, W Jia
IEEE Transactions on Computers 64 (3), 640-653, 2014
1862014
6 million spam tweets: A large ground truth for timely Twitter spam detection
C Chen, J Zhang, X Chen, Y Xiang, W Zhou
2015 IEEE International Conference on Communications (ICC), 7065-7070, 2015
1642015
A Performance Evaluation of Machine Learning-Based Streaming Spam Tweets Detection
C Chen, J Zhang, Y Xie, Y Xiang, W Zhou, MM Hassan, A AlElaiwi, ...
IEEE Transactions on Computational Social Systems 2 (3), 65-76, 2016
1562016
An Effective Network Traffic Classification Method with Unknown Flow Detection
J Zhang, C Chen, Y Xiang, W Zhou, A Vasilakos
IEEE Transactions on Network and Service Management 10 (2), 133-147, 2013
1532013
Addressing the class imbalance problem in twitter spam detection using ensemble learning
S Liu, Y Wang, J Zhang, C Chen, Y Xiang
Computers & Security 69, 35-49, 2017
1332017
Machine Learning Based Cyber Attacks Targeting on Controlled Information: A Survey
Y Miao, C Chen, L Pan, QL Han, J Zhang, Y Xiang
ACM Computing Surveys 54 (7), 136:1-36, 2021
912021
Anomaly-Based Insider Threat Detection Using Deep Autoencoders
L Liu, O De Vel, C Chen, J Zhang, Y Xiang
2018 IEEE International Conference on Data Mining Workshops (ICDMW), 39-48, 2018
742018
Investigating the deceptive information in twitter spam
C Chen, S Wen, J Zhang, Y Xiang, J Oliver, A Alelaiwi, MM Hassan
Future Generation Computer Systems 72, 319-326, 2017
652017
A performance evaluation of deep‐learnt features for software vulnerability detection
X Ban, S Liu, C Chen, C Chua
Concurrency and Computation: Practice and Experience 31 (19), 2019
482019
Asymmetric self-learning for tackling twitter spam drift
C Chen, J Zhang, Y Xiang, W Zhou
2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2015
472015
Cyber Vulnerability Intelligence for IoT Binary
S Liu, M Dibaei, Y Tai, C Chen, J Zhang, Y Xiang
IEEE Transactions on Industrial Informatics 3 (16), 2154 - 2163, 2020
46*2020
An in-depth analysis of abuse on twitter
J Oliver, P Pajares, C Ke, C Chen, Y Xiang
Trend Micro 225, 1-22, 2014
422014
Spammers Are Becoming "Smarter" on Twitter
C Chen, J Zhang, Y Xiang, W Zhou, J Oliver
IT Professional 18 (2), 66-70, 2016
412016
Insider threat identification using the simultaneous neural learning of multi-source logs
L Liu, C Chen, J Zhang, O De Vel, Y Xiang
IEEE Access 7, 183162-183176, 2019
352019
Event detection in online social network: Methodologies, state-of-art, and evolution
X Hu, W Ma, C Chen, S Wen, J Zhang, Y Xiang, G Fei
Computer Science Review 46, 100500, 2022
322022
The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services
Y Miao, M Xue, C Chen, L Pan, J Zhang, BZH Zhao, D Kaafar, Y Xiang
Proceedings on Privacy Enhancing Technologies 2021 (1), 208-227, 2021
30*2021
Deep-learnt features for Twitter spam detection
X Ban, C Chen, S Liu, Y Wang, J Zhang
2018 International Symposium on Security and Privacy in Social Networks and …, 2018
292018
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20