Zhenxiang Chen

Orcid: 0000-0002-4948-3803

According to our database1, Zhenxiang Chen authored at least 135 papers between 1999 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Wi-Diag: Robust Multisubject Abnormal Gait Diagnosis With Commodity Wi-Fi.
IEEE Internet Things J., February, 2024

Feature-Enhanced Convolutional Attention for Unstable Rock Detection in Aerial Images.
IEEE Geosci. Remote. Sens. Lett., 2024

Graph-based multi-information integration network with external news environment perception for Propaganda detection.
Int. J. Web Inf. Syst., 2024

2023
Intra-graph and Inter-graph joint information propagation network with third-order text graph tensor for fake news detection.
Appl. Intell., August, 2023

DC-CNN: Dual-channel Convolutional Neural Networks with attention-pooling for fake news detection.
Appl. Intell., April, 2023

Tuatara: Location-Driven Power-Adaptive Communication for Wireless Body Area Networks.
IEEE Trans. Mob. Comput., 2023

TM-HOL: Topic memory model for detection of hate speech and offensive language.
Concurr. Comput. Pract. Exp., 2023

Low-Frequency Aware Unsupervised Detection of Dark Jargon Phrases on Social Platforms.
Proceedings of the PRICAI 2023: Trends in Artificial Intelligence, 2023

Multimodal Fake News Detection Based on Multi-source Heterogeneous Data Fusion.
Proceedings of the 14th IEEE International Symposium on Parallel Architectures, 2023

Exploring Wi-Fi Privacy Disclosure: A Novel Approach to User Identity Prediction Based on Traffic Multi-level Information.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders.
Proceedings of the IEEE International Conference on Communications, 2023

Adversarial Attack with Genetic Algorithm against IoT Malware Detectors.
Proceedings of the IEEE International Conference on Communications, 2023

Psychological Stress Assessment Method Based on Learning Using Privileged Information Framework.
Proceedings of the 8th International Conference on Biomedical Signal and Image Processing, 2023

Measurement of Illegal Android Gambling App Ecosystem From Joint Promotion Perspective.
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023

Decentralized Reinforced Anonymous FLchain: a Secure Federated Learning Architecture for the Medical Industry.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Speaker recognition system of flexible throat microphone using contrastive learning.
Proceedings of the 23rd IEEE/ACM International Symposium on Cluster, 2023

Overcoming Noisy Labels in Federated Learning Through Local Self-Guiding.
Proceedings of the 23rd IEEE/ACM International Symposium on Cluster, 2023

Prediction method for college student's mental health state based on association rules.
Proceedings of the 3rd International Conference on Bioinformatics and Intelligent Computing, 2023

Estimate Heart Rate from Recovered Facial Signal.
Proceedings of the 3rd International Conference on Bioinformatics and Intelligent Computing, 2023

The Secondary Isolated Data Island: Isolated Data Island Caused by Blockchain in Federated Learning.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2023

CSLog: Anomaly Detection for Syslog Based on Contrastive Self-Supervised Representation Learning.
Proceedings of the 24st Asia-Pacific Network Operations and Management Symposium, 2023

2022
Gaussian Distribution Based Oversampling for Imbalanced Data Classification.
IEEE Trans. Knowl. Data Eng., 2022

Improvement of Neural-Network Classifiers Using Fuzzy Floating Centroids.
IEEE Trans. Cybern., 2022

Flexible privacy-preserving machine learning: When searchable encryption meets homomorphic encryption.
Int. J. Intell. Syst., 2022

Mining Function Homology of Bot Loaders from Honeypot Logs.
CoRR, 2022

INSIDER: A framework for assessing confidence in psychological scales based on multi-modal physiological signal fusion.
Proceedings of the IEEE Smartworld, 2022

Fake news detection method based on multi-feature fusion of entity and structured text.
Proceedings of the 13th IEEE International Symposium on Parallel Architectures, 2022

SFMD: A Semi-Supervised Federated Malicious Traffic Detection Approach in IoT.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

IoT Botnet Detection framework from Network Behavior based on Extreme Learning Machine.
Proceedings of the IEEE INFOCOM 2022, 2022

Decision-based adversarial attack for speaker recognition models.
Proceedings of the 6th International Conference on Computer Science and Artificial Intelligence, 2022

Fake News Detection Based on the Correlation Extension of Multimodal Information.
Proceedings of the Web and Big Data - 6th International Joint Conference, 2022

2021
RC-chain: Reputation-based crowdsourcing blockchain for vehicular networks.
J. Netw. Comput. Appl., 2021

Effective detection of mobile malware behavior based on explainable deep neural network.
Neurocomputing, 2021

Attention-based learning of self-media data for marketing intention detection.
Eng. Appl. Artif. Intell., 2021

Set-Based Adaptive Distributed Differential Evolution for Anonymity-Driven Database Fragmentation.
Data Sci. Eng., 2021

Expert Recommendations with Temporal Dynamics of User Interest in CQA.
Proceedings of the Web Information Systems Engineering - WISE 2021, 2021

HACK: A Hierarchical Model for Fake News Detection.
Proceedings of the Web Information Systems Engineering - WISE 2021, 2021

AndroCreme: Unseen Android Malware Detection Based on Inductive Conformal Learning.
Proceedings of the 20th IEEE International Conference on Trust, 2021

IEdroid: Detecting Malicious Android Network Behavior Using Incremental Ensemble of Ensembles.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021

TranFuzz: An Ensemble Black-Box Attack Framework Based on Domain Adaptation and Fuzzing.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

Enhancing Fake News Classification by Generating Neural Fake Samples.
Proceedings of the IEEE 2nd International Conference on Digital Twins and Parallel Intelligence, 2021

An Arcloss-Based and Openset-Test-Oriented Finger Vein Recognition System.
Proceedings of the Biometric Recognition - 15th Chinese Conference, 2021

Landscape of Requirements Engineering for Machine Learning-based AI Systems.
Proceedings of the 28th Asia-Pacific Software Engineering Conference Workshops, 2021

Chinese NER Using ALBERT and Multi-word Information.
Proceedings of the ACM TURC 2021: ACM Turing Award Celebration Conference - Hefei, China, 30 July 2021, 2021

Efficient Federated Learning Framework Based on Multi-Key Homomorphic Encryption.
Proceedings of the Advances on P2P, Parallel, Grid, Cloud and Internet Computing, 2021

2020
Oblivious DFA evaluation on joint input and its applications.
Inf. Sci., 2020

Deep and broad URL feature mining for android malware detection.
Inf. Sci., 2020

Gradient descent evolved imbalanced data gravitation classification with an application on Internet video traffic identification.
Inf. Sci., 2020

PrivateDL PrivateDL : Privacy-preserving collaborative deep learning against leakage from gradient sharing.
Int. J. Intell. Syst., 2020

A CLSTM-TMN for marketing intention detection.
Eng. Appl. Artif. Intell., 2020

Estimating cement compressive strength using three-dimensional microstructure images and deep belief network.
Eng. Appl. Artif. Intell., 2020

RC-chain: Reputation-based Crowdsourcing Blockchain for Vehicular Networks.
CoRR, 2020

Deep Learning for Multi-Class Antisocial Behavior Identification From Twitter.
IEEE Access, 2020

Distributed Differential Evolution for Anonymity-Driven Vertical Fragmentation in Outsourced Data Storage.
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020

Network-based Malware Detection with a Two-tier Architecture for Online Incremental Update.
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020

Automated Tool for Revising Masking MC/DC Test Suite.
Proceedings of the 2020 IEEE International Symposium on Software Reliability Engineering Workshops, 2020

Design and Implementation of Big Data Management Platform for Android Applications.
Proceedings of the ICBDT 2020: 3rd International Conference on Big Data Technologies, 2020

2019
A mobile malware detection method using behavior features in network traffic.
J. Netw. Comput. Appl., 2019

Secure Multi-Party Computation: Theory, practice and applications.
Inf. Sci., 2019

Imbalanced learning based on adaptive weighting and Gaussian function synthesizing with an application on Android malware detection.
Inf. Sci., 2019

Ranking-based biased learning swarm optimizer for large-scale optimization.
Inf. Sci., 2019

Generative learning for imbalanced data using the Gaussian mixed model.
Appl. Soft Comput., 2019

A Signature-Based Assistant Random Oversampling Method for Malware Detection.
Proceedings of the 18th IEEE International Conference On Trust, 2019

An Abnormal Phone Identification Model with Meta-learning Two-layer Framework Based on PCA Dimension Reduction.
Proceedings of the 2019 11th International Conference on Machine Learning and Computing, 2019

Abnormal Phone Analysis Based on Learning to Rank and Ensemble Learning in Environment of Telecom Big Data.
Proceedings of the 2019 11th International Conference on Machine Learning and Computing, 2019

DART: Detecting Unseen Malware Variants using Adaptation Regularization Transfer Learning.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Application of Recommender System in Intelligent Community under Big Data Scenario.
Proceedings of the 2nd International Conference on Big Data Technologies, 2019

Stacking-Based Ensemble Learning on Low Dimensional Features for Fake News Detection.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

Towards Secure Computation of Similar Patient Query on Genomic Data Under Multiple Keys.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

Imbalanced Data Gravitation Classification Model Using For Internet Video Traffic Identification.
Proceedings of the 5th IEEE International Conference on Big Data Security on Cloud, 2019

An Integration Method Of Classifiers For Abnormal Phone Detection.
Proceedings of the 6th International Conference on Behavioral, 2019

Abnormal telephone identification via an ensemble-based classification framework.
Proceedings of the ACM Turing Celebration Conference - China, 2019

Context-aware recommendations via a tree-based ensemble framework.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2018
Detecting Android Malware Leveraging Text Semantics of Network Flows.
IEEE Trans. Inf. Forensics Secur., 2018

FM: Flexible mapping from one gesture to multiple semantics.
Inf. Sci., 2018

Machine learning based mobile malware detection using highly imbalanced network traffic.
Inf. Sci., 2018

GIST: A generative model with individual and subgroup-based topics for group recommendation.
Expert Syst. Appl., 2018

Secure Comparison Under Ideal/Real Simulation Paradigm.
IEEE Access, 2018

Neural Network Rule Extraction for Real Time Traffic Behavior Identification.
Proceedings of the 2018 International Conference on Security, 2018

A Bagging-based ensemble method for recommendations under uncertain rating data.
Proceedings of the 2018 International Conference on Security, 2018

TrafficPSSF: A Fast and An Effective Malware Detection Under Online and Offline.
Proceedings of the 2018 International Conference on Security, 2018

Lexical Mining of Malicious URLs for Classifying Android Malware.
Proceedings of the Security and Privacy in Communication Networks, 2018

Deep and Broad Learning Based Detection of Android Malware via Network Traffic.
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018

Cluster Center Initialization and Outlier Detection Based on Distance and Density for the K-Means Algorithm.
Proceedings of the Intelligent Systems Design and Applications, 2018

Accurate Identification of Internet Video Traffic Using Byte Code Distribution Features.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

A Fast and Effective Detection of Mobile Malware Behavior Using Network Traffic.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Adaptive Data Sampling Mechanism for Process Object.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

MulAV: Multilevel and Explainable Detection of Android Malware with Data Fusion.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Improving Nearest Neighbor Partitioning Neural Network Classifier Using Multi-layer Particle Swarm Optimization.
Proceedings of the Hybrid Intelligent Systems, 2018

Optimizing floating centroids method neural network classifier using dynamic multilayer particle swarm optimization.
Proceedings of the Genetic and Evolutionary Computation Conference, 2018

Efficient Signature Generation for Classifying Cross-Architecture IoT Malware.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Flexible neural trees based early stage identification for IP traffic.
Soft Comput., 2017

A novel semi-supervised learning method for Internet application identification.
Soft Comput., 2017

Improving Multi-layer Particle Swarm Optimization Using Powell Method.
Proceedings of the Advances in Swarm Intelligence - 8th International Conference, 2017

Three dimensional segmentation for cement microtomography images using self-organizing map and neighborhood features.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017

TextDroid: Semantics-based detection of mobile malware using network flows.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Android Malware Clustering Analysis on Network-Level Behavior.
Proceedings of the Intelligent Computing Theories and Application, 2017

A Novel Method for Generating Benchmark Functions Using Recurrent Neural Network.
Proceedings of the Intelligent Computing Theories and Application, 2017

Finding Android Malware Trace from Highly Imbalanced Network Traffic.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2016
Effectiveness of Statistical Features for Early Stage Internet Traffic Identification.
Int. J. Parallel Program., 2016

DroidCollector: A High Performance Framework for High Quality Android Traffic Collection.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

DroidClassifier: Efficient Adaptive Mining of Application-Layer Header for Classifying Android Malware.
Proceedings of the Security and Privacy in Communication Networks, 2016

TrafficAV: An effective and explainable detection of mobile malware behavior using network traffic.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

Environmental Incidents Detection from Chinese Microblog Based on Sentiment Analysis.
Proceedings of the Human Centered Computing - Second International Conference, 2016

Improving Particle Swarm Optimization Using Co-Optimization of Particles and Acceleration Constants.
Proceedings of the 16th International Conference on Hybrid Intelligent Systems (HIS 2016), 2016

Delay-Tolerant Network Based Secure Transmission System Design.
Proceedings of the Cloud Computing, Security, Privacy in New Computing Environments, 2016

2015
Classify Sina Weibo users into High or Low happiness Groups Using Linguistic and Behavior Features.
CoRR, 2015

A First Look at Android Malware Traffic in First Few Minutes.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Using Map-Based Interactive Interface for Understanding and Characterizing Crime Data in Cities.
Proceedings of the Advances in Swarm and Computational Intelligence, 2015

High Performance NetFPGA and Multi-fractal Wavelet Model Based Network Traffic Generator.
Proceedings of the Advances in Swarm and Computational Intelligence, 2015

Android Malware Network Behavior Analysis at HTTP Protocol Packet Level.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Reconstruction of Android Applications' Network Behavior Based on Application Layer Traffic.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

A Real-time Android Malware Detection System Based on Network Traffic Analysis.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

An Intention-Topic Model Based on Verbs Clustering and Short Texts Topic Mining.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Construction of dynamic three-dimensional microstructure for the hydration of cement using 3D image registration.
Pattern Anal. Appl., 2014

Social shopping communities as an emerging business model of youth entrepreneurship: exploring the effects of website characteristics.
Int. J. Technol. Manag., 2014

Using Linguistic Features to Estimate Suicide Probability of Chinese Microblog Users.
CoRR, 2014

Accelerating FCM neural network classifier using graphics processing units with CUDA.
Appl. Intell., 2014

Research on intelligent terminal oriented optimal parking space recommendation model.
Proceedings of the 17th International IEEE Conference on Intelligent Transportation Systems, 2014

QR code location based reverse car-searching route recommendation model.
Proceedings of the IEEE International Conference on Vehicular Electronics and Safety, 2014

Feature Selection Toward Optimizing Internet Traffic Behavior Identification.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014

Using Linguistic Features to Estimate Suicide Probability of Chinese Microblog Users.
Proceedings of the Human Centered Computing - First International Conference, 2014

2012
Improvement of neural network classifier using floating centroids.
Knowl. Inf. Syst., 2012

Degree-constrained minimum spanning tree problem using genetic algorithm.
Proceedings of the Fourth World Congress on Nature and Biologically Inspired Computing, 2012

Hybrid flexible neural tree for exchange rates forecasting.
Proceedings of the Eighth International Conference on Natural Computation, 2012

2011
A Relational Approach to Model Transformation with QVT Relations Supporting Model Synchronization.
J. Univers. Comput. Sci., 2011

2010
A novel classification method using the combination of FDPS and flexible neural tree.
Neurocomputing, 2010

Traffic classification using probabilistic neural networks.
Proceedings of the Sixth International Conference on Natural Computation, 2010

2009
Online hybrid traffic classifier for Peer-to-Peer systems based on network processors.
Appl. Soft Comput., 2009

Network Traffic Classification Based on Error-Correcting Output Codes and NN Ensemble.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

2007
A Novel Improvement of Neural Network Classification Using Further Division of Partition Space.
Proceedings of the Bio-inspired Modeling of Cognitive Tasks, 2007

A FDRS-Based Data Classification Method Used for Abnormal Network Intrusion Detection.
Proceedings of the Third International Conference on Natural Computation, 2007

2006
A Novel Method of P2P Hosts Detection Based on Flexible Neural Tree.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006

1999
The animal tests of chaotic signal therapy for epilepsy (CSTE).
Proceedings of the International Joint Conference Neural Networks, 1999

Pattern grouping strategy makes BP algorithm less sensitive to learning rate.
Proceedings of the International Joint Conference Neural Networks, 1999


  Loading...