Enhancing cloud-based IoT security through trustworthy cloud service: An integration of security and reputation approach X Li, Q Wang, X Lan, X Chen, N Zhang, D Chen IEEE access 7, 9368-9383, 2019 | 124 | 2019 |
A focused crawler based on naive bayes classifier W Wang, X Chen, Y Zou, H Wang, Z Dai 2010 Third International Symposium on Intelligent Information Technology and …, 2010 | 55 | 2010 |
BTCAS: A blockchain-based thoroughly cross-domain authentication scheme H Zhang, X Chen, X Lan, H Jin, Q Cao Journal of Information Security and Applications 55, 102538, 2020 | 42 | 2020 |
Interlayer link prediction in multiplex social networks: An iterative degree penalty algorithm R Tang, S Jiang, X Chen, H Wang, W Wang, W Wang Knowledge-Based Systems 194, 105598, 2020 | 37 | 2020 |
An anomalous behavior detection model in cloud computing X Ye, X Chen, H Wang, X Zeng, G Shao, X Yin, C Xu Tsinghua Science and Technology 21 (3), 322-332, 2016 | 36 | 2016 |
End-to-end attack on text-based CAPTCHAs based on cycle-consistent generative adversarial network C Li, X Chen, H Wang, P Wang, Y Zhang, W Wang Neurocomputing 433, 223-236, 2021 | 32 | 2021 |
Containerguard: A real-time attack detection system in container-based big data platform Y Wang, Q Wang, X Chen, D Chen, X Fang, M Yin, N Zhang IEEE Transactions on Industrial Informatics 18 (5), 3327-3336, 2020 | 32 | 2020 |
Spatial and temporal analysis on public opinion evolution of epidemic situation about novel coronavirus pneumonia based on micro blog data 陈兴蜀, 常天祐, 王海舟, 赵志龙, 张杰 Journal of Sichuan University (Natural Science Edition) 57 (2), 409-416, 2020 | 30 | 2020 |
Flow context and host behavior based shadowsocks’s traffic identification X Zeng, X Chen, G Shao, T He, Z Han, Y Wen, Q Wang IEEE Access 7, 41017-41032, 2019 | 29 | 2019 |
Review on the application of deep learning in network attack detection T Yi, X Chen, Y Zhu, W Ge, Z Han Journal of Network and Computer Applications 212, 103580, 2023 | 25 | 2023 |
An Internet Traffic Identification Approach Based on GA and PSO-SVM. J Tan, X Chen, M Du J. Comput. 7 (1), 19-29, 2012 | 25 | 2012 |
Interlayer link prediction in multiplex social networks based on multiple types of consistency between embedding vectors R Tang, Z Miao, S Jiang, X Chen, H Wang, W Wang IEEE Transactions on Cybernetics 53 (4), 2426-2439, 2021 | 22 | 2021 |
Containing misinformation spreading in temporal social networks W Wang, Y Ma, T Wu, Y Dai, X Chen, LA Braunstein Chaos: An Interdisciplinary Journal of Nonlinear Science 29 (12), 2019 | 22 | 2019 |
Cloud virtual machine lifecycle security framework based on trusted computing X Jin, Q Wang, X Li, X Chen, W Wang Tsinghua Science and Technology 24 (5), 520-534, 2019 | 21 | 2019 |
Accelerated k-nearest neighbors algorithm based on principal component analysis for text categorization M Du, X Chen Journal of Zhejiang University SCIENCE C 14 (6), 407-416, 2013 | 20 | 2013 |
Online Internet traffic identification algorithm based on multistage classifier D Min, C Xingshu, T Jun China Communications 10 (2), 89-97, 2013 | 20 | 2013 |
Enhancing trustworthiness of Internet of Vehicles in space–air–ground-integrated networks: Attestation approach Q Wang, X Chen, X Jin, X Li, D Chen, X Qin IEEE Internet of Things Journal 9 (8), 5992-6002, 2021 | 18 | 2021 |
A novel internet traffic identification approach using wavelet packet decomposition and neural network J Tan, X Chen, M Du, K Zhu Journal of Central South University 19 (8), 2218-2230, 2012 | 18 | 2012 |
Big data analytics for network security and intelligence X Chen, X Zeng, W Wang, G Shao Advanced Engineering Sciences 39 (43), 112-129, 2017 | 17 | 2017 |
DGA-based botnet detection toward imbalanced multiclass learning Y Chen, B Pang, G Shao, G Wen, X Chen Tsinghua Science and Technology 26 (4), 387-402, 2021 | 15 | 2021 |