Xingshu Chen

Orcid: 0000-0002-8705-2617

According to our database1, Xingshu Chen authored at least 70 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A novel framework for Chinese personal sensitive information detection.
Connect. Sci., December, 2024

Detecting Offensive Language Based on Graph Attention Networks and Fusion Features.
IEEE Trans. Comput. Soc. Syst., February, 2024

Comprehensive vulnerability aspect extraction.
Appl. Intell., February, 2024

2023
Laws and Regulations tell how to classify your data: A case study on higher education.
Inf. Process. Manag., May, 2023

Interlayer Link Prediction in Multiplex Social Networks Based on Multiple Types of Consistency Between Embedding Vectors.
IEEE Trans. Cybern., April, 2023

Unveiling Qzone: A measurement study of a large-scale online social network.
Inf. Sci., April, 2023

Identifying Cantonese rumors with discriminative feature integration in online social networks.
Expert Syst. Appl., April, 2023

Review on the application of deep learning in network attack detection.
J. Netw. Comput. Appl., March, 2023

DockerWatch: a two-phase hybrid detection of malware using various static features in container cloud.
Soft Comput., 2023

Listen carefully to experts when you classify data: A generic data classification ontology encoded from regulations.
Inf. Process. Manag., 2023

A systematic security analysis of EMV protocol.
Comput. Stand. Interfaces, 2023

Prompt Packer: Deceiving LLMs through Compositional Instruction with Hidden Attacks.
CoRR, 2023

RAUCG: Retrieval-Augmented Unsupervised Counter Narrative Generation for Hate Speech.
CoRR, 2023

DKCS: A Dual Knowledge-Enhanced Abstractive Cross-Lingual Summarization Method Based on Graph Attention Networks.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

ANTI: An Adaptive Network Traffic Indexing Algorithm for High-Speed Networks.
Proceedings of the IEEE Global Communications Conference, 2023

2022
Contrastive Learning Enhanced Intrusion Detection.
IEEE Trans. Netw. Serv. Manag., December, 2022

ContainerGuard: A Real-Time Attack Detection System in Container-Based Big Data Platform.
IEEE Trans. Ind. Informatics, 2022

Network structural perturbation against interlayer link prediction.
Knowl. Based Syst., 2022

Enhancing Trustworthiness of Internet of Vehicles in Space-Air-Ground-Integrated Networks: Attestation Approach.
IEEE Internet Things J., 2022

Privacy-preserving Security Inference Towards Cloud-Edge Collaborative Using Differential Privacy.
CoRR, 2022

ClueGraphSum: Let Key Clues Guide the Cross-Lingual Abstractive Summarization.
CoRR, 2022

Detecting Offensive Language on Social Networks: An End-to-end Detection Method based on Graph Attention Networks.
CoRR, 2022

Interlayer link prediction based on multiple network structural attributes.
Comput. Networks, 2022

MURAS: An Efficient Multi-Value-Proof-Based Remote Attestation Scheme for Cloud Platform.
Proceedings of the 12th International Conference on Communication and Network Security, 2022

Unsupervised Anomaly Detection for Container Cloud Via BILSTM-Based Variational Auto-Encoder.
Proceedings of the IEEE International Conference on Acoustics, 2022

Autoscaling cracker: an efficient asymmetric DDoS attack on serverless functions.
Proceedings of the IEEE Global Communications Conference, 2022

ApkClassiFy: Identification and Classification of packed Android Malicious Applications.
Proceedings of the IEEE Global Communications Conference, 2022

Fake Restaurant Review Detection Using Deep Neural Networks with Hybrid Feature Fusion Method.
Proceedings of the Database Systems for Advanced Applications, 2022

vTPM-SM: An Application Scheme of SM2/SM3/SM4 Algorithms Based on Trusted Computing in Cloud Environment.
Proceedings of the IEEE 15th International Conference on Cloud Computing, 2022

2021
User Identification Based on Integrating Multiple User Information across Online Social Networks.
Secur. Commun. Networks, 2021

PurExt: Automated Extraction of the Purpose-Aware Rule from the Natural Language Privacy Policy in IoT.
Secur. Commun. Networks, 2021

Corrigendum to "BNRDT: When Data Transmission Meets Blockchain".
Secur. Commun. Networks, 2021

Improving adversarial robustness of deep neural networks by using semantic information.
Knowl. Based Syst., 2021

End-to-end attack on text-based CAPTCHAs based on cycle-consistent generative adversarial network.
Neurocomputing, 2021

Analyzing Adversarial Robustness of Deep Neural Networks in Pixel Space: a Semantic Perspective.
CoRR, 2021

2020
Deep Learning Hierarchical Representation From Heterogeneous Flow-Level Communication Data.
IEEE Trans. Inf. Forensics Secur., 2020

Extension of Research on Security as a Service for VMs in IaaS Platform.
Secur. Commun. Networks, 2020

An Android Malware Detection Model Based on DT-SVM.
Secur. Commun. Networks, 2020

BNRDT: When Data Transmission Meets Blockchain.
Secur. Commun. Networks, 2020

Interlayer link prediction in multiplex social networks: An iterative degree penalty algorithm.
Knowl. Based Syst., 2020

BTCAS: A Blockchain-Based Thoroughly Cross-Domain Authentication Scheme.
J. Inf. Secur. Appl., 2020

An End-to-End Attack on Text-based CAPTCHAs Based on Cycle-Consistent Generative Adversarial Network.
CoRR, 2020

Interlayer Link Prediction in Multiplex Social Networks Based on Multiple Types of Consistency between Embedding Vectors.
CoRR, 2020

An efficient scheme for SDN state consistency verification in cloud computing environment.
Concurr. Comput. Pract. Exp., 2020

2019
Dynamics on Hybrid Complex Network: Botnet Modeling and Analysis of Medical IoT.
Secur. Commun. Networks, 2019

Containing misinformation spreading in temporal social networks.
CoRR, 2019

Detecting Proxy User Based on Communication Behavior Portrait.
Comput. J., 2019

Flow Context and Host Behavior Based Shadowsocks's Traffic Identification.
IEEE Access, 2019

An Automatic Event Detection Method for Massive Wireless Access Prediction.
IEEE Access, 2019

Enhancing Cloud-Based IoT Security Through Trustworthy Cloud Service: An Integration of Security and Reputation Approach.
IEEE Access, 2019

2018
SCCAF: A Secure and Compliant Continuous Assessment Framework in Cloud-Based IoT Context.
Wirel. Commun. Mob. Comput., 2018

Content pollution propagation in the overlay network of peer-to-peer live streaming systems: modelling and analysis.
IET Commun., 2018

Research of Security as a Service for VMs in IaaS Platform.
IEEE Access, 2018

2017
Exploring the accuracy of capturing snapshots in large-scale P2P IPTV systems.
Int. J. Commun. Syst., 2017

Research and implementation of a high performance parallel computing digital down converter on graphics processing unit.
Concurr. Comput. Pract. Exp., 2017

2016
A fuzzy detection approach toward different speed port scan attacks based on Dempster-Shafer evidence theory.
Secur. Commun. Networks, 2016

2014
An Effective Scheme for Performance Improvement of P2P Live Streaming Systems.
J. Networks, 2014

An efficient method of P2P traffic identification based on wavelet packet decomposition and kernel principal component analysis.
Int. J. Commun. Syst., 2014

2013
Accelerated k-nearest neighbors algorithm based on principal component analysis for text categorization.
J. Zhejiang Univ. Sci. C, 2013

A Video Sharing Site Oriented Data Collection System.
J. Softw., 2013

A resources monitoring architecture for P2P file-sharing systems.
Proceedings of the Fifth International Conference on Digital Image Processing, 2013

2012
An Improved Adaptive Routing Algorithm Based on Link Analysis.
J. Networks, 2012

IPTV-RM: A Resources Monitoring Architecture for P2P IPTV Systems.
J. Networks, 2012

An Internet Traffic Identification Approach Based on GA and PSO-SVM.
J. Comput., 2012

2010
Processing Constrained <i>k</i>-Closest Pairs Queries in Crime Databases.
Proceedings of the Security Informatics, 2010

A Novel P2P Identification Algorithm Based on Genetic Algorithm and Particle Swarm Optimization.
Proceedings of the Third International Symposium on Parallel Architectures, 2010

A Focused Crawler Based on Naive Bayes Classifier.
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010

2008
Constrained k-closest pairs query processing based on growing window in crime databases.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

A Reliable Distributed Process Management System.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

An Optimized Parallel FFT Algorithm on Multiprocessors with Cache Technology in Linux.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008


  Loading...