Chen Li

Orcid: 0000-0003-4307-0896

According to our database1, Chen Li authored at least 19 papers between 2021 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Zero-trust based dynamic access control for cloud computing.
Cybersecur., December, 2025

Towards Unsupervised Time-Series Anomaly Detection for Virtual Cloud Networks.
IEEE Trans. Inf. Forensics Secur., 2025

IMS: Towards Computability and Dynamicity for Intent-Driven Micro-Segmentation.
IEEE Trans. Dependable Secur. Comput., 2025

Behavioral Biometrics-Based Continuous Authentication Using a Lightweight Latent Representation Masked One-Class Autoencoder.
IEEE Trans. Dependable Secur. Comput., 2025

End-to-end anomaly detection of service function chain through multi-source data in cloud-native systems.
Comput. Secur., 2025

ZTKA: A Zero-Trust Based Kernel Encryption Architecture for Transparent Data Protection.
Proceedings of the 28th International Conference on Computer Supported Cooperative Work in Design, 2025

CPRAM: Cryptographic Performance-Aware Resource Affinity Management in Para-virtualized Environment.
Proceedings of the 28th International Conference on Computer Supported Cooperative Work in Design, 2025

Lightweight Distributed Cloud-Native Service Function Chain Anomaly Detection for Edge-Cloud Networks.
Proceedings of the 28th International Conference on Computer Supported Cooperative Work in Design, 2025

2024
CloudFusion: Multi-Source Intrusion Detection in Cloud Environments.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

EI-XIDS: An explainable intrusion detection system based on integration framework.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

An Efficient Caching Mechanism for End-host Network Functions.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

Desktop Virtualization Optimization Methods Based on IDV Architecture.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

2022
The Shared Memory Based Cryptographic Card Virtualization.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022

An Unsupervised Approach For Detecting Lateral Movement Logins Based On Knowledge Graph.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

A Novel Discrete Bi-objective Optimization Method for Virtual Machine Placement.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022

2021
TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings.
Cybersecur., 2021

Log-based Anomaly Detection from Multi-view by Associating Anomaly Scores with User Trust.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Evalt: Authenticate Implicitly Before Attacks.
Proceedings of the 28th International Conference on Telecommunications, 2021

A Keystroke-based Continuous User Authentication in Virtual Desktop Infrastructure.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021


  Loading...