Chengxiang Tan

According to our database1, Chengxiang Tan authored at least 28 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Unawareness detection: Discovering black-box malicious models and quantifying privacy leakage risks.
Comput. Secur., February, 2024

2023
Membership inference attack with relative decision boundary distance.
CoRR, 2023

OTIEA: Ontology-enhanced Triple Intrinsic-Correlation for Cross-lingual Entity Alignment.
CoRR, 2023

Type-enhanced Ensemble Triple Representation via Triple-aware Attention for Cross-lingual Entity Alignment.
CoRR, 2023

2021
Heterogeneous identity trust management method based on risk assessment.
J. Intell. Fuzzy Syst., 2021

A hierarchical method for assessing cyber security situation based on ontology and fuzzy cognitive maps.
Int. J. Inf. Comput. Secur., 2021

2020
Heterogeneous Identity Expression and Association Method Based on Attribute Aggregation "In Prepress".
J. Web Eng., 2020

Joint Entity and Relation Extraction with a Hybrid Transformer and Reinforcement Learning Based Model.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
An improved network security situation assessment approach in software defined networks.
Peer-to-Peer Netw. Appl., 2019

Discovery method for distributed denial-of-service attack behavior in SDNs using a feature-pattern graph model.
Frontiers Inf. Technol. Electron. Eng., 2019

Decentralized attribute-based conjunctive keyword search scheme with online/offline encryption and outsource decryption for cloud computing.
Future Gener. Comput. Syst., 2019

Sense-Based Topic Word Embedding Model for Item Recommendation.
IEEE Access, 2019

2018
Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation.
Sensors, 2018

Secure Multi-Authority Data Access Control Scheme in Cloud Storage System Based on Attribute-Based Signcryption.
IEEE Access, 2018

Research on Text Classification for Identifying Fake News.
Proceedings of the 2018 International Conference on Security, 2018

Construction and Application of Knowledge Graph System in Computer Science.
Proceedings of the 2018 International Conference on Security, 2018

SEDalvik: A Kernel-Level Android Behavior Forensic Method.
Proceedings of the 2018 International Conference on Security, 2018

2017
Cloud service platform of electronic identity in cyberspace.
Clust. Comput., 2017

2015
Digitization and Visualization of Greenhouse Tomato Plants in Indoor Environments.
Sensors, 2015

基于动态权限集的Android强制访问控制模型 (Mandatory Access Control Model for Android Based on Dynamic Privilege Set).
计算机科学, 2015

2012
RFID-based Electronic Identity Security Cloud Platform in Cyberspace.
J. Networks, 2012

2011
Provable Data Possession of Resource-constrained Mobile Devices in Cloud Computing.
J. Networks, 2011

2010
Mobile VPN Scheme Based on SOCKS V5.
Proceedings of the 2010 International Conference on Machine Vision and Human-machine Interface, 2010

2009
Mobile Authentication Scheme Using SMS.
Proceedings of the 2009 IITA International Conference on Services Science, 2009

A High Security Framework for SMS.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

2008
A Hybrid RBAC-PBAC Access Control Model for Network Isolation System.
Proceedings of the International Workshop on Knowledge Discovery and Data Mining, 2008

Building a High-performance Communication Framework for Network Isolation System.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Cryptanalysis and Improvement of an 'Efficient Remote Mutual Authentication and Key Agreement'.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008


  Loading...