Chunjie Cao

Orcid: 0000-0001-9439-8256

According to our database1, Chunjie Cao authored at least 46 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
FACILE: A capsule network with fewer capsules and richer hierarchical information for malware image classification.
Comput. Secur., February, 2024

2023
FISHFUZZ: Catch Deeper Bugs by Throwing Larger Nets.
Proceedings of the 32nd USENIX Security Symposium, 2023

Radiofrequency Fingerprint Feature Extraction and Recognition Using a Coordinate Attention-Guided Deep Residual Shrinkage Network.
Proceedings of the International Conference on Networking and Network Applications, 2023

LGWAE: Label-Guided Weighted Autoencoder Network for Flexible Targeted Attacks of Deep Hashing.
Proceedings of the International Joint Conference on Neural Networks, 2023

Revisiting Graph Contrastive Learning for Anomaly Detection.
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023

2022
IMCLNet: A lightweight deep neural network for Image-based Malware Classification.
J. Inf. Secur. Appl., 2022

Mul-GAD: a semi-supervised graph anomaly detection framework via aggregating multi-view information.
CoRR, 2022

FishFuzz: Throwing Larger Nets to Catch Deeper Bugs.
CoRR, 2022

A Short Signal Backoff MAC Protocol Based on Game Theory for Underwater Sensor Networks.
IEEE Access, 2022

Deep Learning and Data Randomness based Blind Recognition of Channel Codes.
Proceedings of the IEEE Smartworld, 2022

DRSN with Simple Parameter-Free Attention Module for Specific Emitter Identification.
Proceedings of the IEEE International Conference on Trust, 2022

Secure Government Data Sharing Based on Blockchain and Attribute-Based Encryption.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2022

Secure Data Storage Scheme of Judicial System Based on Blockchain.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2022

Blind Identification of Channel Codes under AWGN and Fading Conditions via Deep Learning.
Proceedings of the International Conference on Networking and Network Applications, 2022

Feature Extraction and Identification of Specific Radiation Sources Based on Axial Integral Bispectrum and Deep Residual Shrinkage Network.
Proceedings of the International Conference on Networking and Network Applications, 2022

Hierarchical Attention Network for Interpretable and Fine-Grained Vulnerability Detection.
Proceedings of the IEEE INFOCOM 2022, 2022

DCAL: A New Method for Defending Against Adversarial Examples.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

Vulnerability Dataset Construction Methods Applied To Vulnerability Detection: A Survey.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

2021
DCDC-LSB: Double Cover Dark Channel Least Significant Bit Steganography.
Proceedings of the Artificial Intelligence and Security - 7th International Conference, 2021

RF Transmitter Identification and Classification Based on Deep Residual Shrinkage Network.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

DACN: Malware Classification Based on Dynamic Analysis and Capsule Networks.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021

GWDGA: An Effective Adversarial DGA.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021

Multi-modal Universal Embedding Representations for Language Understanding.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021

2020
A secure data deletion scheme for IoT devices through key derivation encryption and data analysis.
Future Gener. Comput. Syst., 2020

Robust GAN Based on Attention Mechanism.
Proceedings of the Cyberspace Safety and Security - 12th International Symposium, 2020

Malware Variants Detection Based on Feature Fusion.
Proceedings of the Cyberspace Safety and Security - 12th International Symposium, 2020

2019
Block rank sparsity-aware DOA estimation with large-scale arrays in the presence of unknown mutual coupling.
Digit. Signal Process., 2019

A Practical Marine Wireless Sensor Network Monitoring System Based on LoRa and MQTT.
CoRR, 2019

Verifiable algorithm for outsourced database with updating.
Clust. Comput., 2019

Modeling Data, Information and Knowledge for Security Protection of Hybrid IoT and Edge Resources.
IEEE Access, 2019

Webshell Detection Model Based on Deep Learning.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Fine-Grained Comparable Encryption Scheme in Multi-User Settings.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

Privacy Protection in Blockchain Systems: A Review.
Proceedings of the Data Processing Techniques and Applications for Cyber-Physical Systems, 2019

A Blind Watermarking Scheme Using Adaptive Neuro-Fuzzy Inference System Optimized by BP Network and LS Learning Model.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
Tensor-Based Angle Estimation Approach for Strictly Noncircular Sources with Unknown Mutual Coupling in Bistatic MIMO Radar.
Sensors, 2018

Robust DOA Estimation for MIMO Radar in Unknown Nonuniform Noise and Mutual Coupling.
Proceedings of the 10th IEEE Sensor Array and Multichannel Signal Processing Workshop, 2018

Off-Grid DOA Estimation in Mutual Coupling via Robust Sparse Bayesian Learning.
Proceedings of the 23rd IEEE International Conference on Digital Signal Processing, 2018

A Secure Blind Watermarking Scheme Based on Dual Frequency Domains and Ergodic Matrix.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Searchable Encryption Scheme Based on CPABE with Attribute Update in a Cloud Medical Environment.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
A Variable Weight Privacy-Preserving Algorithm for the Mobile Crowd Sensing Network.
J. Electr. Comput. Eng., 2017

Vulnerability Analysis of Interdependent Scale-Free Networks with Complex Coupling.
J. Electr. Comput. Eng., 2017

Secure first-price sealed-bid auction scheme.
EURASIP J. Inf. Secur., 2017

Angle Estimation of Noncircular Source in MIMO Radar via Unitary Nyström Method.
Proceedings of the Communications, Signal Processing, and Systems, 2017

2014
Multi-domain Direct Anonymous Attestation Scheme from Pairings.
Proceedings of the Network and System Security - 8th International Conference, 2014

2009
Wireless Mesh Networks-Based Multinetwork Convergence and Security Access.
Proceedings of the Guide to Wireless Mesh Networks, 2009

2008
Constructing UC Secure and Constant-Round Group Key Exchange Protocols via Secret Sharing.
EURASIP J. Wirel. Commun. Netw., 2008


  Loading...