Chundong Wang

Orcid: 0000-0001-8170-3020

Affiliations:
  • Tianjin University of Technology, Ministry of Education, Key Laboratory of Computer Vision and System, China
  • Nankai University, Department of Computer Science, China (PhD 2007)


According to our database1, Chundong Wang authored at least 54 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
MLRN: A multi-view local reconstruction network for single image restoration.
Inf. Process. Manag., March, 2024

WordIllusion: An adversarial text generation algorithm based on human cognitive system.
Cogn. Syst. Res., January, 2024

DIGWO-N-BEATS: An evolutionary time series prediction method for situation prediction.
Inf. Sci., 2024

Simplices-based higher-order enhancement graph neural network for multi-behavior recommendation.
Inf. Process. Manag., 2024

Protecting privacy and enhancing utility: A novel approach for personalized trajectory data publishing using noisy prefix tree.
Comput. Secur., 2024

Research on Blockchain Cross-Chain Model Based on "NFT + Cross-Chain Bridge".
IEEE Access, 2024

2023
SBlocksim: A sharding-based tool for simulating consensus efficiency.
Softw. Impacts, September, 2023

IMGC-GNN: A multi-granularity coupled graph neural network recommendation method based on implicit relationships.
Appl. Intell., June, 2023

A novel personality detection method based on high-dimensional psycholinguistic features and improved distributed Gray Wolf Optimizer for feature selection.
Inf. Process. Manag., 2023

A Novel Approach for Trajectory Partition Privacy in Location-Based Services.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

A Copyright Authentication Method Balancing Watermark Robustness and Data Distortion.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
CFDIL: a context-aware feature deep interaction learning for app recommendation.
Soft Comput., 2022

Unreachable Peers Communication Scheme in Decentralized Networks Based on Peer-to-Peer Overlay Approaches.
Future Internet, 2022

TGNRec: Recommendation Based on Trust Networks and Graph Neural Networks.
Proceedings of the IEEE Smartworld, 2022

2021
Network Risk Assessment Based on Baum Welch Algorithm and HMM.
Mob. Networks Appl., 2021

Fine-grained Trust-based Routing Algorithm for Wireless Sensor Networks.
Mob. Networks Appl., 2021

2020
An activity theory model for dynamic evolution of attack graph based on improved least square genetic algorithm.
Int. J. Inf. Comput. Secur., 2020

Data protection and provenance in cloud of things environment: research challenges.
Int. J. Inf. Comput. Secur., 2020

Low-Speed Injection Attack Detection on CAN Bus.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

A Trustworthy Evaluation System Based on Blockchain.
Proceedings of the Database Systems for Advanced Applications, 2020

Adversarial DGA Domain Examples Generation and Detection.
Proceedings of the CCRIS 2020: International Conference on Control, 2020

2019
A detection model of malicious Android applications based on Naive Bayes.
Int. J. Embed. Syst., 2019

The extraction of security situation in heterogeneous log based on Str-FSFDP density peak cluster.
Int. J. Comput. Sci. Eng., 2019

An improved <i>k</i>NN text classification method.
Int. J. Comput. Sci. Eng., 2019

Situation prediction of large-scale Internet of Things network security.
EURASIP J. Inf. Secur., 2019

An efficient DDoS detection based on SU-Genetic feature selection.
Clust. Comput., 2019

2018
Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information.
Sensors, 2018

Channel State Information-Based Detection of Sybil Attacks in Wireless Networks.
J. Internet Serv. Inf. Secur., 2018

A Distributed Anomaly Detection System for In-Vehicle Network Using HTM.
IEEE Access, 2018

Data Provenance With Retention of Reference Relations.
IEEE Access, 2018

LAMP: Lightweight and Accurate Malicious Access Points Localization via Channel Phase Information.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Quick and Accurate Android Malware Detection Based on Sensitive APIs.
Proceedings of the 2018 IEEE International Conference on Smart Internet of Things (SmartIoT), 2018

Detecting Evil-Twin Attack with the Crowd Sensing of Landmark in Physical Layer.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
An Android Malicious Code Detection Method Based on Improved DCA Algorithm.
Entropy, 2017

An android malware dynamic detection method based on service call co-occurrence matrices.
Ann. des Télécommunications, 2017

An Energy Efficient Routing Protocol for In-Vehicle Wireless Sensor Networks.
Proceedings of the Data Science, 2017

2014
A novel approach to generate and extract audio watermark.
Int. J. High Perform. Syst. Archit., 2014

Situation evaluate on hierarchical network security based on D-S evidence theory.
Int. J. Commun. Networks Distributed Syst., 2014

The application of dynamic password technology based on ECC algorithm in mobile payment.
Int. J. Commun. Networks Distributed Syst., 2014

2013
Security Analysis and Improvement for Kerberos Based on Dynamic Password and Diffie-Hellman Algorithm.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Design and Implementation of Authentication and Authorization Flow in ESCP System.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

2012
Virtual Machine-based Intrusion Detection System Framework in Cloud Computing Environment.
J. Comput., 2012

2009
An Intelligent Home Middleware System Based on Context-Awareness.
Proceedings of the Fifth International Conference on Natural Computation, 2009

An Improved RED Congestion Algorithm Based on Partition of Network Segment.
Proceedings of the Fifth International Conference on Natural Computation, 2009

A Framework of Intelligent Agent Based Middleware for Context Aware Computing.
Proceedings of the Fifth International Conference on Natural Computation, 2009

A Wireless Network Congestion Control Algorithm Based on Adaptive QoS and Wireless Bandwidth.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

A New Algorithm Combining Self Organizing Map with Simulated Annealing Used in Intrusion Detection.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

Botnet Detection Based on Analysis of Mail Flow.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

A Distributed Intrusion Detection System Based on Mobile Agents.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

A Rule-Based Ontology for Context-Aware Computing.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

2008
Context-Aware Environment-Role-Based Access Control Model for Web Services.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

2007
Multi-agent Based Architecture of Context-aware Systems.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Zero-Knowledge-Based User Authentication Technique in Context-aware System.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

SOM-Based Anomaly Intrusion Detection System.
Proceedings of the Embedded and Ubiquitous Computing, International Conference, 2007


  Loading...