Hongsong Chen

Orcid: 0000-0002-8159-4984

According to our database1, Hongsong Chen authored at least 33 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Multivariate time series anomaly detection by fusion of deep convolution residual autoencoding reconstruction model and ConvLstm forecasting model.
Comput. Secur., February, 2024

2023
Blockchain-based internet of things security architecture and applications.
J. Ambient Intell. Humaniz. Comput., December, 2023

Security Issues and Solutions in Federate Learning Under IoT Critical Infrastructure.
Wirel. Pers. Commun., March, 2023

Power of Fuzzing and Machine Learning in Smart Contract Security Validation.
Proceedings of the Fuzzy Systems and Data Mining IX, 2023

2021
Security Threats and Defensive Approaches in Machine Learning System Under Big Data Environment.
Wirel. Pers. Commun., 2021

DDoS Attack Simulation and Machine Learning-Based Detection Approach in Internet of Things Experimental Environment.
Int. J. Inf. Secur. Priv., 2021

2020
Novel LDoS attack detection by Spark-assisted correlation analysis approach in wireless sensor network.
IET Inf. Secur., 2020

Modeling and detection of the multi-stages of Advanced Persistent Threats attacks based on semi-supervised learning and complex networks characteristics.
Future Gener. Comput. Syst., 2020

2019
Using Improved Hilbert-Huang Transformation Method to Detect Routing-Layer Reduce of Quality Attack in Wireless Sensor Network.
Wirel. Pers. Commun., 2019

国家电网边缘计算信息系统安全风险评估方法研究 (Research on Security Risk Assessment Method of State Grid Edge Computing Information System).
计算机科学, 2019

Recent Advances in Cryptovirology: State-of-the-Art Crypto Mining and Crypto Ransomware Attacks.
KSII Trans. Internet Inf. Syst., 2019

A novel HHT and KS statistic approach to detect RoQ attack in wireless sensor network.
Int. J. Embed. Syst., 2019

Bayesian network based weighted APT attack paths modeling in cloud computing.
Future Gener. Comput. Syst., 2019

A novel SMP-based survivability evaluation metric and approach in wireless sensor network.
Comput. Sci. Inf. Syst., 2019

A Novel Low-Rate Denial of Service Attack Detection Approach in ZigBee Wireless Sensor Network by Combining Hilbert-Huang Transformation and Trust Evaluation.
IEEE Access, 2019

2018
Mitigating replay attacks with ZigBee solutions.
Netw. Secur., 2018

TCSTM: A task-characteristic-considered steady-state thermal model of multicore processors.
Microprocess. Microsystems, 2018

Bayesian-Boolean Logic Security Assessment Model for Malware-Free Intrusions.
Int. J. Netw. Secur., 2018

Multi-stage crypto ransomware attacks: A new emerging cyber threat to critical infrastructure and industrial control systems.
ICT Express, 2018

2017
Reasoning crypto ransomware infection vectors with Bayesian networks.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

2016
基于分段模型检测的云服务跨域认证协议的形式化分析与验证 (Cloud Services Cross-domain Authentication Protocol Formal Analysis and Verification Based on Fragment Model Check).
计算机科学, 2016

2015
Hadoop-Based Healthcare Information System Design and Wireless Security Communication Implementation.
Mob. Inf. Syst., 2015

Design and Implementation of Cloud Server Remote Management System Based on IMPI Protocol.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Quantitative Trustworthy Evaluation Scheme for Trust Routing Scheme in Wireless Sensor Networks.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

2014
Multilabels-Based Scalable Access Control for Big Data Applications.
IEEE Cloud Comput., 2014

2013
Networks, Crowds, and Markets: Reasoning about a Highly Connected World [Book Review].
IEEE Technol. Soc. Mag., 2013

2011
A Novel Trust Routing Scheme Based on Node Behaviour Evaluation for Mobile AD Hoc Networks.
Intell. Autom. Soft Comput., 2011

2010
A Real Implementation of DPI in 3G Network.
Proceedings of the Global Communications Conference, 2010

CFCSS without Aliasing for SPARC Architecture.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2007
Using Network Processor to Establish Trustworthy Agent Scheme for AODV Routing Protocol.
Wirel. Pers. Commun., 2007

Design and performance evaluation of a multi-agent-based dynamic lifetime security scheme for AODV routing protocol.
J. Netw. Comput. Appl., 2007

Using network processor to establish security agent for AODV routing protocol.
J. Comput. Inf. Technol., 2007

2003
Orthogonal Design Method for Optimal Cache Configuration.
Proceedings of the Advanced Parallel Programming Technologies, 5th International Workshop, 2003


  Loading...