Chunhe Xia
According to our database1,
Chunhe Xia
authored at least 56 papers
between 2006 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
On csauthors.net:
Bibliography
2020
A Cognitive Method for Automatically Retrieving Complex Information on a Large Scale.
Sensors, 2020
A behavior-aware SLA-based framework for guaranteeing the security conformance of cloud service.
Frontiers Comput. Sci., 2020
IEEE Access, 2020
GHSCN: A Graph Neural Network-Based API Popularity Prediction Method in Service Ecosystem.
IEEE Access, 2020
H2P: A Novel Model to Study the Propagation of Modern Hybrid Worm in Hierarchical Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020
2019
SADI: A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks.
IEEE Trans. Dependable Secur. Comput., 2019
EURASIP J. Wirel. Commun. Netw., 2019
IEEE Access, 2019
An Information Source Identification Algorithm Based on Shortest Arborescence of Network.
Proceedings of the 8th International Conference on Software and Computer Applications, 2019
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
2018
Int. J. Embed. Syst., 2018
Coordinated scan detection algorithm based on the global characteristics of time sequence.
Int. J. Comput. Sci. Eng., 2018
Self-healing group key distribution protocol in wireless sensor networks for secure IoT communications.
Future Gener. Comput. Syst., 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
2017
The Spatial-Temporal Perspective: The Study of the Propagation of Modern Social Worms.
IEEE Trans. Inf. Forensics Secur., 2017
Frontiers Comput. Sci., 2017
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
Proceedings of the 12th Chinese Conference on Computer Supported Cooperative Work and Social Computing, 2017
CloudSec: A Novel Approach to Verifying Security Conformance at the Bottom of the Cloud.
Proceedings of the 2017 IEEE International Congress on Big Data, 2017
2015
Modeling, conflict detection, and verification of a new virtualization role-based access control framework.
Secur. Commun. Networks, 2015
KSII Trans. Internet Inf. Syst., 2015
The Temporal Characteristic of Human Mobility: Modeling and Analysis of Social Worm Propagation.
IEEE Commun. Lett., 2015
Proceedings of the Computational Intelligence and Intelligent Systems, 2015
2014
An Approach for Description of Computer Network Defense Scheme and Its Simulation Verification.
J. Comput., 2014
Proceedings of the Trusted Systems - 6th International Conference, 2014
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014
Coordinated Scan Detection Algorithm Based on the Global Characteristics of Time Sequence.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014
Proceedings of the 2014 Ninth International Conference on P2P, 2014
2013
Proceedings of the Frontiers in Internet Technologies, 2013
Proceedings of the Frontiers in Internet Technologies, 2013
VRBAC: An Extended RBAC Model for Virtualized Environment and Its Conflict Checking Approach.
Proceedings of the Frontiers in Internet Technologies, 2013
Proceedings of the Frontiers in Internet Technologies, 2013
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013
Proceedings of the 2013 International Conference on Cloud and Service Computing, 2013
2012
Semantic Similarity Analysis between High-Level Model Description Text and Low-Level Implementation Text for Network Survivability.
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Web Intelligence, 2012
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012
2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
2010
A Tactical Intelligence Production Model of Computer Network Self-Organizing Operations.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, 2010
Proceedings of the Advanced Intelligent Computing Theories and Applications, 2010
2009
Proceedings of the Web Information Systems and Mining, International Conference, 2009
Proceedings of the Web Information Systems and Mining, International Conference, 2009
2008
J. Softw. Eng. Appl., 2008
A New Type of Self-Adaptive Mechanism for Network Survivability Based on Intrusion Deception.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008
A Game Theoretical Attack-Defense Model Oriented to Network Security Risk Assessment.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008
A Game Theoretical Attack-Defense Model Oriented to Network Security Risk Assessment.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008
2007
Frontiers Comput. Sci. China, 2007
Proceedings of the Future Generation Communication and Networking, 2007
2006
J. Comput. Res. Dev., 2006