Kangfeng Zheng

Orcid: 0000-0002-1160-5596

According to our database1, Kangfeng Zheng authored at least 72 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
User authentication method based on keystroke dynamics and mouse dynamics using HDA.
Multim. Syst., April, 2023

Comparative Analysis of ASV Spoofing Countermeasures: Evaluating Res2Net-Based Approaches.
IEEE Signal Process. Lett., 2023

Social Engineering Attack-Defense Strategies Based on Reinforcement Learning.
Comput. Syst. Sci. Eng., 2023

2022
User Authentication Method Based on Keystroke Dynamics and Mouse Dynamics with Scene-Irrelated Features in Hybrid Scenes.
Sensors, 2022

A Hybrid PSO-BPSO Based Kernel Extreme Learning Machine Model for Intrusion Detection.
J. Inf. Process. Syst., 2022

Predicting User Susceptibility to Phishing Based on Multidimensional Features.
Comput. Intell. Neurosci., 2022

Moving Target Defense Strategy Selection Method Based on Long-term Traffic Prediction.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

2021
Game Theoretic Suppression of Forged Messages in Online Social Networks.
IEEE Trans. Syst. Man Cybern. Syst., 2021

Phishing Website Detection Based on Deep Convolutional Neural Network and Random Forest Ensemble Learning.
Sensors, 2021

Personality Classification of Social Users Based on Feature Fusion.
Sensors, 2021

Generating facial expression adversarial examples based on saliency map.
Image Vis. Comput., 2021

Adv-Emotion: The Facial Expression Adversarial Attack.
Int. J. Pattern Recognit. Artif. Intell., 2021

Adversarial Text Generation for Personality Privacy Protection.
Proceedings of the DSIT 2021: 4th International Conference on Data Science and Information Technology, Shanghai, China, July 23, 2021

CENTIME: A Direct Comprehensive Traffic Features Extraction for Encrypted Traffic Classification.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021

2020
Graph Adaptation Network with Domain-Specific Word Alignment for Cross-Domain Relation Extraction.
Sensors, 2020

User Authentication Method Based on MKL for Keystroke and Mouse Behavioral Feature Fusion.
Secur. Commun. Networks, 2020

Simulation Design for Security Testing of Integrated Electronic Systems.
IEEE Netw., 2020

A Nature-inspired Multiple Kernel Extreme Learning Machine Model for Intrusion Detection.
KSII Trans. Internet Inf. Syst., 2020

Detection of compromised accounts for online social networks based on a supervised analytical hierarchy process.
IET Inf. Secur., 2020

Text Classification with Lexicon from PreAttention Mechanism.
CoRR, 2020

Hierarchical Transformer Network for Utterance-level Emotion Recognition.
CoRR, 2020

Feature subset selection combining maximal information entropy and maximal information coefficient.
Appl. Intell., 2020

AATMS: An Anti-Attack Trust Management Scheme in VANET.
IEEE Access, 2020

Network Intrusion Detection Based on Supervised Adversarial Variational Auto-Encoder With Regularization.
IEEE Access, 2020

Using Improved Conditional Generative Adversarial Networks to Detect Social Bots on Twitter.
IEEE Access, 2020

An Explainable Machine Learning Framework for Intrusion Detection Systems.
IEEE Access, 2020

2019
Improving the Classification Effectiveness of Intrusion Detection by Using Improved Conditional Variational AutoEncoder and Deep Neural Network.
Sensors, 2019

Group-Based Susceptible-Infectious-Susceptible Model in Large-Scale Directed Networks.
Secur. Commun. Networks, 2019

A Neighbor Prototype Selection Method Based on CCHPSO for Intrusion Detection.
Secur. Commun. Networks, 2019

User Identification Using Real Environmental Human Computer Interaction Behavior.
KSII Trans. Internet Inf. Syst., 2019

Detecting Malicious Social Robots with Generative Adversarial Networks.
KSII Trans. Internet Inf. Syst., 2019

Capacity of blockchain based Internet-of-Things: Testbed and analysis.
Internet Things, 2019

User identification by keystroke dynamics using improved binary particle swarm optimisation.
Int. J. Bio Inspired Comput., 2019

Survey on blockchain for Internet of Things.
Comput. Commun., 2019

A Session and Dialogue-Based Social Engineering Framework.
IEEE Access, 2019

Efficient Strategy Selection for Moving Target Defense Under Multiple Attacks.
IEEE Access, 2019

Improving Reliability: User Authentication on Smartphones Using Keystroke Biometrics.
IEEE Access, 2019

SMOTETomek-Based Resampling for Personality Recognition.
IEEE Access, 2019

Moving Target Defense Against Injection Attacks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

Detecting Spear-phishing Emails Based on Authentication.
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019

2018
The Impact of Link Duration on the Integrity of Distributed Mobile Networks.
IEEE Trans. Inf. Forensics Secur., 2018

Feature selection method with joint maximal information entropy between features and class.
Pattern Recognit., 2018

An Ensemble Method based on Selection Using Bat Algorithm for Intrusion Detection.
Comput. J., 2018

Elastic Switch Migration for Control Plane Load Balancing in SDN.
IEEE Access, 2018

Social Bot Detection Using Tweets Similarity.
Proceedings of the Security and Privacy in Communication Networks, 2018

Attack and Defence of Ethereum Remote APIs.
Proceedings of the IEEE Globecom Workshops, 2018

2017
Collaborative Authentication in Decentralized Dense Mobile Networks With Key Predistribution.
IEEE Trans. Inf. Forensics Secur., 2017

Scalable Node-Centric Route Mutation for Defense of Large-Scale Software-Defined Networks.
Secur. Commun. Networks, 2017

Computing Adaptive Feature Weights with PSO to Improve Android Malware Detection.
Secur. Commun. Networks, 2017

Feature Selection to Mine Joint Features from High-dimension Space for Android Malware Detection.
KSII Trans. Internet Inf. Syst., 2017

WORM-HUNTER: A Worm Guard System using Software-defined Networking.
KSII Trans. Internet Inf. Syst., 2017

Fuzzy-synthetic minority oversampling technique: Oversampling based on fuzzy set theory for Android malware detection in imbalanced datasets.
Int. J. Distributed Sens. Networks, 2017

Analytic model on data security in VANETs.
Proceedings of the 17th International Symposium on Communications and Information Technologies, 2017

Node-centric route mutation for large-scale SDN based on 3D earth mover's distance model.
Proceedings of the 17th International Symposium on Communications and Information Technologies, 2017

2016
Virus Propagation Modeling and Convergence Analysis in Large-Scale Networks.
IEEE Trans. Inf. Forensics Secur., 2016

Flow-based Anomaly Detection Using Access Behavior Profiling and Time-sequenced Relation Mining.
KSII Trans. Internet Inf. Syst., 2016

Anti-Pollution Source Location Privacy Preserving Scheme in Wireless Sensor Networks.
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016

Detection of command and control in advanced persistent threat based on independent access.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2015
Using Genetic Algorithm for Optimal Security Hardening in Risk Flow Attack Graph.
KSII Trans. Internet Inf. Syst., 2015

Exploring risk flow attack graph for security risk assessment.
IET Inf. Secur., 2015

Towards a multiobjective framework for evaluating network security under exploit attacks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Secure Data Transmission and Modelling in Vehicular Ad Hoc Networks.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015

2014
ACO-BTM: A Behavior Trust Model in Cloud Computing Environment.
Int. J. Comput. Intell. Syst., 2014

2012
A Danger Theory Based Mobile Virus Detection Model and Its Application in Inhibiting Virus.
J. Networks, 2012

Biologically Inspired Anomaly Detection for Hierarchical Wireless Sensor Networks.
J. Networks, 2012

A Secure Network Coding-based Data Gathering Model and Its Protocol in Wireless Sensor Networks.
Int. J. Comput. Intell. Syst., 2012

2011
Multiple-image compressed encryption and decryption by compressive holography.
Proceedings of the 2011 IEEE Visual Communications and Image Processing, 2011

A study on energy efficient cluster-based network coding protocol for aggregated-data gathering in wireless sensor networks.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2011

2010
Research of an Innovative P2P-Based Botnet.
Proceedings of the 2010 International Conference on Machine Vision and Human-machine Interface, 2010

2008
A Defending Mechanism against DDoS Based on Registration and Authentication.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A Simulation Platform of DDoS Attack Based on Network Processor.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
A Data Safety Transmission Solution in Web Application.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2007


  Loading...