Chunhua Wu

Orcid: 0000-0003-0535-6236

According to our database1, Chunhua Wu authored at least 47 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Collaborate to Compete: An Empirical Matching Game Under Incomplete Information in Rank-Order Tournaments.
Mark. Sci., September, 2023

Social Engineering Attack-Defense Strategies Based on Reinforcement Learning.
Comput. Syst. Sci. Eng., 2023

2022
A Hybrid PSO-BPSO Based Kernel Extreme Learning Machine Model for Intrusion Detection.
J. Inf. Process. Syst., 2022

Generative Modeling in Structural-Hankel Domain for Color Image Inpainting.
CoRR, 2022

2021
Phishing Website Detection Based on Deep Convolutional Neural Network and Random Forest Ensemble Learning.
Sensors, 2021

Generating facial expression adversarial examples based on saliency map.
Image Vis. Comput., 2021

Adv-Emotion: The Facial Expression Adversarial Attack.
Int. J. Pattern Recognit. Artif. Intell., 2021

High-dimensional Assisted Generative Model for Color Image Restoration.
CoRR, 2021

A Word-Level Method for Generating Adversarial Examples Using Whole-Sentence Information.
Proceedings of the Natural Language Processing and Chinese Computing, 2021

WordErrorSim: An Adversarial Examples Generation Method in Chinese by Erroneous Knowledge.
Proceedings of the ICCDA 2021: The 5th International Conference on Compute and Data Analysis, 2021

Neural Network Model Extraction Based on Adversarial Examples.
Proceedings of the AISS 2021: 3rd International Conference on Advanced Information Science and System, Sanya, China, November 26, 2021

2020
Graph Adaptation Network with Domain-Specific Word Alignment for Cross-Domain Relation Extraction.
Sensors, 2020

Profiting from the Decoy Effect: A Case Study of an Online Diamond Retailer.
Mark. Sci., 2020

A Nature-inspired Multiple Kernel Extreme Learning Machine Model for Intrusion Detection.
KSII Trans. Internet Inf. Syst., 2020

Text Classification with Lexicon from PreAttention Mechanism.
CoRR, 2020

Hierarchical Transformer Network for Utterance-level Emotion Recognition.
CoRR, 2020

A Novel Measure of Uncertainty in the Dempster-Shafer Theory.
IEEE Access, 2020

2019
Modeling and Comparisons of Aggregated Flyback Microinverters in Aspect of Harmonic Resonances With the Grid.
IEEE Trans. Ind. Electron., 2019

Improving the Classification Effectiveness of Intrusion Detection by Using Improved Conditional Variational AutoEncoder and Deep Neural Network.
Sensors, 2019

A Neighbor Prototype Selection Method Based on CCHPSO for Intrusion Detection.
Secur. Commun. Networks, 2019

Mobile Hailing Technology and Taxi Driving Behaviors.
Mark. Sci., 2019

Season Ticket Buyer Value and Secondary Market Options.
Mark. Sci., 2019

Diagnosis of Pulmonary Embolism by Treatment Based on Analysis of Multi-slice Spiral Ct Pulmonary Artery Images.
J. Medical Imaging Health Informatics, 2019

User Identification Using Real Environmental Human Computer Interaction Behavior.
KSII Trans. Internet Inf. Syst., 2019

User identification by keystroke dynamics using improved binary particle swarm optimisation.
Int. J. Bio Inspired Comput., 2019

A Session and Dialogue-Based Social Engineering Framework.
IEEE Access, 2019

Improving Reliability: User Authentication on Smartphones Using Keystroke Biometrics.
IEEE Access, 2019

SMOTETomek-Based Resampling for Personality Recognition.
IEEE Access, 2019

Predicting Personality Using Facebook Status Based on Semi-supervised Learning.
Proceedings of the 2019 11th International Conference on Machine Learning and Computing, 2019

Cross-View Adaptation Network for Cross-Domain Relation Extraction.
Proceedings of the Chinese Computational Linguistics - 18th China National Conference, 2019

2018
An Ensemble Method based on Selection Using Bat Algorithm for Intrusion Detection.
Comput. J., 2018

Social Bot Detection Using Tweets Similarity.
Proceedings of the Security and Privacy in Communication Networks, 2018

2017
Computing Adaptive Feature Weights with PSO to Improve Android Malware Detection.
Secur. Commun. Networks, 2017

Feature Selection to Mine Joint Features from High-dimension Space for Android Malware Detection.
KSII Trans. Internet Inf. Syst., 2017

Fuzzy-synthetic minority oversampling technique: Oversampling based on fuzzy set theory for Android malware detection in imbalanced datasets.
Int. J. Distributed Sens. Networks, 2017

Modeling and Simulation Study of Photovoltaic DC Arc Faults.
Proceedings of the Advanced Computational Methods in Energy, Power, Electric Vehicles, and Their Integration, 2017

2016
Flow-based Anomaly Detection Using Access Behavior Profiling and Time-sequenced Relation Mining.
KSII Trans. Internet Inf. Syst., 2016

Detection of command and control in advanced persistent threat based on independent access.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2015
The Economic Value of Online Reviews.
Mark. Sci., 2015

Matching Value and Market Design in Online Advertising Networks: An Empirical Analysis.
Mark. Sci., 2015

2013
Recoverable Video Watermark in DCT Domain.
J. Comput., 2013

2012
A Video Watermarking Algorithm of H.264/AVC for Content Authentication.
J. Networks, 2012

Multiple-File Remote Data Checking for cloud storage.
Comput. Secur., 2012

2011
Measuring the Lifetime Value of Customers Acquired from Google Search Advertising.
Mark. Sci., 2011

2009
VAOFS: A Verifiable Append-Only File System for Regulatory Compliance.
Proceedings of the Eighth International Conference on Grid and Cooperative Computing, 2009

2008
Utility Presentation in Destination Decision System.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Research on Evaluating Urban Comprehensive Competitiveness during Multi-year and the Spatial Characters of Important Cities in China.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008


  Loading...