Chenglong Li

Orcid: 0000-0001-6775-9386

Affiliations:
  • National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing, China


According to our database1, Chenglong Li authored at least 11 papers between 2010 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2018
Internet Traffic Classification Based on Incremental Support Vector Machines.
Mob. Networks Appl., 2018

WLRRS: A new recommendation system based on weighted linear regression models.
Comput. Electr. Eng., 2018

2016
DroidChain: A novel Android malware detection method based on behavior chains.
Pervasive Mob. Comput., 2016

ActivityHijacker: Hijacking the Android Activity Component for Sensitive Data.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

2015
DroidChain: A novel malware detection method for Android based on behavior chain.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2013
Generation and Distribution of Decoy Document System.
Proceedings of the Trustworthy Computing and Services, 2013

2012
Relay recommendation system (RRS) and selective anonymity for tor.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

TMT: A new Tunable Mechanism of Tor based on the path length.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

2011
"Super nodes" in Tor: existence and security implication.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
An Novel Hybrid Method for Effectively Classifying Encrypted Traffic.
Proceedings of the Global Communications Conference, 2010

HMC: A Novel Mechanism for Identifying Encrypted P2P Thunder Traffic.
Proceedings of the Global Communications Conference, 2010


  Loading...