Xunxun Chen

According to our database1, Xunxun Chen authored at least 26 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Learning group interaction for sports video understanding from a perspective of athlete.
Frontiers Comput. Sci., August, 2024

2023
Detecting Fake-Normal Pornographic and Gambling Websites through one Multi-Attention HGNN.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Deepfake Video Detection via Facial Action Dependencies Estimation.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Hidden Path: Understanding the Intermediary in Malicious Redirections.
IEEE Trans. Inf. Forensics Secur., 2022

D$^{\bf{3}}$: Duplicate Detection Decontaminator for Multi-Athlete Tracking in Sports Videos.
CoRR, 2022

A Lightweight Graph-based Method to Detect Pornographic and Gambling Websites with Imperfect Datasets.
Proceedings of the IEEE International Conference on Trust, 2022

Sparse Relation Graph for Group Activity Recognition.
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022

Improving Deepfake Video Detection with Comprehensive Self-consistency Learning.
Proceedings of the Cyber Security - 19th China Annual Conference, 2022

D<sup>3</sup>: Duplicate Detection Decontaminator for Multi-Athlete Tracking in Sports Videos.
Proceedings of the Computer Vision - ACCV 2022, 2022

2021
Structured Sparsity Model Based Trajectory Tracking Using Private Location Data Release.
IEEE Trans. Dependable Secur. Comput., 2021

MASA: An efficient framework for anomaly detection in multi-attributed networks.
Comput. Secur., 2021

Finding disposable domain names: A linguistics-based stacking approach.
Comput. Networks, 2021

Winding Path: Characterizing the Malicious Redirection in Squatting Domain Names.
Proceedings of the Passive and Active Measurement - 22nd International Conference, 2021

CDNFinder: Detecting CDN-hosted Nodes by Graph-Based Semi-Supervised Classification.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

2019
MURITE-Detector: Identifying User-Role in Information Theft Events of Mobile Network.
Proceedings of the 18th IEEE International Conference On Trust, 2019

A Linguistics-based Stacking Approach to Disposable Domains Detection.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

A Comprehensive Measurement Study of Domain-Squatting Abuse.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
An Efficient Framework for Detecting Evolving Anomalous Subgraphs in Dynamic Networks.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

MUI-defender: CNN-Driven, Network Flow-Based Information Theft Detection for Mobile Users.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018

2017
An Efficient Approach to Event Detection and Forecasting in Dynamic Multivariate Social Media Networks.
Proceedings of the 26th International Conference on World Wide Web, 2017

Detecting Information Theft Based on Mobile Network Flows for Android Users.
Proceedings of the 2017 International Conference on Networking, Architecture, and Storage, 2017

Learning Deep Feature Fusion for Group Images Classification.
Proceedings of the Computer Vision - Second CCF Chinese Conference, 2017

2014
A light-weight trust-based QoS routing algorithm for ad hoc networks.
Pervasive Mob. Comput., 2014

2012
A Webpage Deletion Algorithm Based on Hierarchical Filtering.
Proceedings of the Web Information Systems and Mining - International Conference, 2012

An efficient trust-based opportunistic routing for ad hoc networks.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2012

2005
WM+: An Optimal Multi-pattern String Matching Algorithm Based on the WM Algorithm.
Proceedings of the Advanced Parallel Processing Technologies, 6th International Workshop, 2005


  Loading...