Xiuzhen Chen

According to our database1, Xiuzhen Chen authored at least 23 papers between 2008 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Malicious encrypted traffic features extraction model based on unsupervised feature adaptive learning.
J. Comput. Virol. Hacking Tech., 2022

Hybrid intrusion detection system based on Dempster-Shafer evidence theory.
Comput. Secur., 2022

2020
Recommender System-Based Diffusion Inferring for Open Social Networks.
IEEE Trans. Comput. Soc. Syst., 2020

2019
Unsupervised Cross-Database Micro-Expression Recognition Using Target-Adapted Least-Squares Regression.
IEICE Trans. Inf. Syst., 2019

Target-Adapted Subspace Learning for Cross-Corpus Speech Emotion Recognition.
IEICE Trans. Inf. Syst., 2019

An Information Diffusion Path Construction Algorithm Based on User Characteristics and Text Characteristics.
Proceedings of the 2019 International Conference on Machine Learning and Cybernetics, 2019

2016
Security authentication mechanism based on symmetric polynomials for SCADA systems.
Proceedings of the International Conference on Security of Smart Cities, 2016

2015
A new genetic-based rumor diffusion model for social networks.
Proceedings of the International Conference on Cyber Security of Smart Cities, 2015

Survey on packet marking fields and information for IP traceback.
Proceedings of the International Conference on Cyber Security of Smart Cities, 2015

Classified security protection evaluation for vehicle information system.
Proceedings of the International Conference on Cyber Security of Smart Cities, 2015

Bayesian-based model for a reputation system in vehicular networks.
Proceedings of the International Conference on Cyber Security of Smart Cities, 2015

2014
Towards a Fine-Grained Access Control for Cloud.
Proceedings of the 11th IEEE International Conference on e-Business Engineering, 2014

Authoritative Scholarly Paper Recommendation Based on Paper Communities.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

Multiple evidence fusion based information diffusion model for social network.
Proceedings of the 9th International Conference on Communications and Networking in China, 2014

2013
Chinese SNS blog classification using semantic similarity.
Proceedings of the Fifth International Conference on Computational Aspects of Social Networks, 2013

2012
Hierarchical activeness state evaluation model for BBS network community.
Proceedings of the 7th International Conference on Communications and Networking in China, 2012

Network Vulnerability Analysis Using Text Mining.
Proceedings of the Intelligent Information and Database Systems - 4th Asian Conference, 2012

Community Detection Using Label Propagation in Entropic Order.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012

2011
Quantitative Similarity Evaluation of Internet Social Network Entities Based on Supernetwork.
J. Comput. Networks Commun., 2011

A new genetics-based diffusion model for social networks.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2011

2010
An Approach to Privacy-Preserving Alert Correlation and Analysis.
Proceedings of the 5th IEEE Asia-Pacific Services Computing Conference, 2010

2008
An OVAL-based active vulnerability assessment system for enterprise computer networks.
Inf. Syst. Frontiers, 2008

Building network attack graph for alert causal correlation.
Comput. Secur., 2008


  Loading...