Chun Long

According to our database1, Chun Long authored at least 15 papers between 2014 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Autoencoder ensembles for network intrusion detection.
Proceedings of the 24th International Conference on Advanced Communication Technology, 2022

2021
ELSV: An Effective Anomaly Detection System from Web Access Logs.
Proceedings of the IEEE International Performance, 2021

An Effective Intrusion Detection Model based on Random Forest Algorithm with I-SMOTE.
Proceedings of the 23rd International Conference on Enterprise Information Systems, 2021

Tamper Detection Based on Webpage Change Features.
Proceedings of the 23rd International Conference on Advanced Communication Technology, 2021

2020
An intrusion detection algorithm based on bag representation with ensemble support vector machine in cloud computing.
Concurr. Comput. Pract. Exp., 2020

An Effective Parallel SVM Intrusion Detection Model for Imbalanced Training Datasets.
Proceedings of the 22nd International Conference on Enterprise Information Systems, 2020

2019
An Attack Behaviors Prediction Model Based on Bag Representation in Time Series.
Proceedings of the 44th IEEE Conference on Local Computer Networks, 2019

A Hybrid Intrusion Detection Algorithm Based on Gaussian Mixture Model and Nearest Neighbors.
Proceedings of the 44th IEEE Conference on Local Computer Networks, 2019

An Effective RF-based Intrusion Detection Algorithm with Feature Reduction and Transformation.
Proceedings of the 21st International Conference on Enterprise Information Systems, 2019

A Real-time Big Data Framework for Network Security Situation Monitoring.
Proceedings of the 21st International Conference on Enterprise Information Systems, 2019

Log Layering Based on Natural Language Processing.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019

2018
Security Situation Assessment Method Based on States Transition.
Proceedings of the IEEE International Conference on Information and Automation, 2018

A Method for Performance Optimization of Virtual Network I/O Based on DPDK-SRIOV.
Proceedings of the IEEE International Conference on Information and Automation, 2018

A quantum secure direct communication protocol based on six-qubit cluster state.
Proceedings of the 20th International Conference on Advanced Communication Technology, 2018

2014
An SR-ISODATA algorithm for IDS alerts aggregation.
Proceedings of the IEEE International Conference on Information and Automation, 2014


  Loading...