Chunhe Xia

Orcid: 0000-0003-4424-8449

According to our database1, Chunhe Xia authored at least 76 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
PPBFL: A Privacy Protected Blockchain-based Federated Learning Model.
CoRR, 2024

2023
FedDroidMeter: A Privacy Risk Evaluator for FL-Based Android Malware Classification Systems.
Entropy, July, 2023

From the Dialectical Perspective: Modeling and Exploiting of Hybrid Worm Propagation.
IEEE Trans. Inf. Forensics Secur., 2023

Capturing Dynamics of Information Diffusion in SNS: A Survey of Methodology and Techniques.
ACM Comput. Surv., 2023

FBChain: A Blockchain-based Federated Learning Model with Efficiency and Secure Communication.
CoRR, 2023

HL-DPoS: An Enhanced Anti-Long-Range Attack DPoS Algorithm.
CoRR, 2023

BRFL: A Blockchain-based Byzantine-Robust Federated Learning Model.
CoRR, 2023

Safe DreamerV3: Safe Reinforcement Learning with World Models.
CoRR, 2023

FedDroidADP: An Adaptive Privacy-Preserving Framework for Federated-Learning-Based Android Malware Classification System.
Proceedings of the Knowledge Science, Engineering and Management, 2023

2022
Epidemic Heterogeneity and Hierarchy: A Study of Wireless Hybrid Worm Propagation.
IEEE Trans. Mob. Comput., 2022

Secure and Temporary Access Delegation With Equality Test for Cloud-Assisted IoV.
IEEE Trans. Intell. Transp. Syst., 2022

Social network behavior and public opinion manipulation.
J. Inf. Secur. Appl., 2022

FedHGCDroid: An Adaptive Multi-Dimensional Federated Learning for Privacy-Preserving Android Malware Classification.
Entropy, 2022

CRCS: Learning Synergistic Cascade Correlation for Microscopic Cascade Prediction.
Proceedings of the IEEE Smartworld, 2022

2021
HNN: A Novel Model to Study the Intrusion Detection Based on Multi-Feature Correlation and Temporal-Spatial Analysis.
IEEE Trans. Netw. Sci. Eng., 2021

Detection, Traceability, and Propagation of Mobile Malware Threats.
IEEE Access, 2021

2020
A Cognitive Method for Automatically Retrieving Complex Information on a Large Scale.
Sensors, 2020

A behavior-aware SLA-based framework for guaranteeing the security conformance of cloud service.
Frontiers Comput. Sci., 2020

Robust Reasoning Over Heterogeneous Textual Information for Fact Verification.
IEEE Access, 2020

GHSCN: A Graph Neural Network-Based API Popularity Prediction Method in Service Ecosystem.
IEEE Access, 2020

A Feasible Chinese Text Data Preprocessing Strategy.
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020

H2P: A Novel Model to Study the Propagation of Modern Hybrid Worm in Hierarchical Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

A BERT-based Ensemble Model for Chinese News Topic Prediction.
Proceedings of the BDE 2020: 2nd International Conference on Big Data Engineering, 2020

2019
SADI: A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks.
IEEE Trans. Dependable Secur. Comput., 2019

A hotspot-based probabilistic cache placement policy for ICN in MANETs.
EURASIP J. Wirel. Commun. Netw., 2019

Hierarchical Comprehensive Context Modeling for Chinese Text Classification.
IEEE Access, 2019

An Information Source Identification Algorithm Based on Shortest Arborescence of Network.
Proceedings of the 8th International Conference on Software and Computer Applications, 2019

Feature Generation: A Novel Intrusion Detection Model Based on Prototypical Network.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

Which Node Properties Identify the Propagation Source in Networks?
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

Topic Reconstruction: A Novel Method Based on LDA Oriented to Intrusion Detection.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

A Novel Intrusion Detector Based on Deep Learning Hybrid Methods.
Proceedings of the 5th IEEE International Conference on Big Data Security on Cloud, 2019

2018
Static compliance checking beyond separation of duty constraints.
Int. J. Embed. Syst., 2018

Coordinated scan detection algorithm based on the global characteristics of time sequence.
Int. J. Comput. Sci. Eng., 2018

Self-healing group key distribution protocol in wireless sensor networks for secure IoT communications.
Future Gener. Comput. Syst., 2018

H-Securebox: A Hardened Memory Data Protection Framework on ARM Devices.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Online Social Spammer Detection Based on Semi-supervised Learning.
Proceedings of the 2018 International Conference on Algorithms, 2018

2017
The Spatial-Temporal Perspective: The Study of the Propagation of Modern Social Worms.
IEEE Trans. Inf. Forensics Secur., 2017

On the satisfiability of authorization requirements in business process.
Frontiers Comput. Sci., 2017

A Dynamic Placement Policy of Virtual Machine Based on MOGA in Cloud Environment.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

An Attack-oriented Task Execution Collaborative Defense Protocol.
Proceedings of the 12th Chinese Conference on Computer Supported Cooperative Work and Social Computing, 2017

CloudSec: A Novel Approach to Verifying Security Conformance at the Bottom of the Cloud.
Proceedings of the 2017 IEEE International Congress on Big Data, 2017

2015
Modeling, conflict detection, and verification of a new virtualization role-based access control framework.
Secur. Commun. Networks, 2015

An Interval Algebra-based Modeling and Routing Method in Bus Delay Tolerant Network.
KSII Trans. Internet Inf. Syst., 2015

The Temporal Characteristic of Human Mobility: Modeling and Analysis of Social Worm Propagation.
IEEE Commun. Lett., 2015

A Method of Network Security Situation Assessment Based on Hidden Markov Model.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

2014
An Approach for Description of Computer Network Defense Scheme and Its Simulation Verification.
J. Comput., 2014

Key-Exposure Protection in Public Auditing with User Revocation in Cloud Storage.
Proceedings of the Trusted Systems - 6th International Conference, 2014

An automated method of penetration testing.
Proceedings of the IEEE Computers, 2014

Detecting Compromised VM via Application-Aware Anomaly Detection.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

Coordinated Scan Detection Algorithm Based on the Global Characteristics of Time Sequence.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

Automatic Generation Algorithm of Penetration Graph in Penetration Testing.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2013
Co-segmentation of 3D shapes via multi-view spectral clustering.
Vis. Comput., 2013

On the Spatial-temporal Reachability of DTNs.
Proceedings of the Frontiers in Internet Technologies, 2013

A Computer Network Defense Policy Refinement Method.
Proceedings of the Frontiers in Internet Technologies, 2013

VRBAC: An Extended RBAC Model for Virtualized Environment and Its Conflict Checking Approach.
Proceedings of the Frontiers in Internet Technologies, 2013

A Conflict-Related Rules Detection Tool for Access Control Policy.
Proceedings of the Frontiers in Internet Technologies, 2013

A Verification Method of Enterprise Network Reachability Based on Topology Path.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

A Botnet-Oriented Collaborative Defense Scheme Description Language.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

Optimal Service Selection Based on Business for Cloud Computing.
Proceedings of the 2013 International Conference on Cloud and Service Computing, 2013

2012
Semantic Similarity Analysis between High-Level Model Description Text and Low-Level Implementation Text for Network Survivability.
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Web Intelligence, 2012

Characterization and modeling in large-scale urban DTNs.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

On the distribution of inter contact time for DTNs.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

2011
Design and Implementation of Bus Net Routing Algorithm.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
A Tactical Intelligence Production Model of Computer Network Self-Organizing Operations.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, 2010

Application for Artificial Bee Colony Algorithm in Migration of Mobile Agent.
Proceedings of the Advanced Intelligent Computing Theories and Applications, 2010

2009
Research on Survivability of Mobile Ad-hoc Network.
J. Softw. Eng. Appl., 2009

An Evaluation Model of CNO Intelligence Information Confidence.
Proceedings of the Web Information Systems and Mining, International Conference, 2009

A Bulk Email Oriented Multi-party Non-repudiation Exchange Protocol.
Proceedings of the Web Information Systems and Mining, International Conference, 2009

2008
An Algorithm for Generation of Attack Signatures Based on Sequences Alignment.
J. Softw. Eng. Appl., 2008

A New Type of Self-Adaptive Mechanism for Network Survivability Based on Intrusion Deception.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

A Network Security Risk Assessment Framework Based on Game Theory.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

A Game Theoretical Attack-Defense Model Oriented to Network Security Risk Assessment.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

A Game Theoretical Attack-Defense Model Oriented to Network Security Risk Assessment.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
P2P worm detection based on application identification.
Frontiers Comput. Sci. China, 2007

Research on Simulation Framework of Structured P2P Network.
Proceedings of the Future Generation Communication and Networking, 2007

2006
A Non-Repudiation Protocol for E-Mail and Its Formal Analysis.
J. Comput. Res. Dev., 2006


  Loading...