Changzhen Hu

Orcid: 0009-0006-8646-7489

According to our database1, Changzhen Hu authored at least 93 papers between 2009 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
IMUNE: A novel evolutionary algorithm for influence maximization in UAV networks.
J. Netw. Comput. Appl., 2025

2024
A Novel Dynamic Event-Triggered Dissipative Filtering for T-S Fuzzy Systems with Asynchronous Constraints.
Int. J. Fuzzy Syst., October, 2024

Packet header-based reweight-long short term memory (Rew-LSTM) method for encrypted network traffic classification.
Computing, August, 2024

Event-Based Distributed Set-Membership Estimation for Complex Networks Under Deception Attacks.
IEEE Trans Autom. Sci. Eng., July, 2024

A blockchain-based ubiquitous entity authentication and management scheme with homomorphic encryption for FANET.
Peer Peer Netw. Appl., March, 2024

Event-Based Distributed Set-Membership Estimation for Complex Networks: A Coding-Decoding Method.
IEEE Trans. Netw. Sci. Eng., 2024

Evaluation of Application Layer DDoS Attack Effect in Cloud Native Applications.
IEEE Trans. Cloud Comput., 2024

MDGraph: A novel malware detection method based on memory dump and graph neural network.
Expert Syst. Appl., 2024

TEDA: a trusted execution environment-and-blockchain-based data protection architecture for Internet of Things.
Computing, 2024

Blockchain-and-6G-based Ubiquitous UAV Task Security Management Architecture.
Comput. Commun., 2024

Component-based modeling of cascading failure propagation in directed dual-weight software networks.
Comput. Networks, 2024

2023
DEFIA: Evaluate defense effectiveness by fusing behavior information of cyberattacks.
Inf. Sci., October, 2023

ADCaDeM: A Novel Method of Calculating Attack Damage Based on Differential Manifolds.
IEEE Trans. Dependable Secur. Comput., 2023

B-UAVM: A Blockchain-Supported Secure Multi-UAV Task Management Scheme.
IEEE Internet Things J., 2023

TEBDS: A Trusted Execution Environment-and-Blockchain-supported IoT data sharing system.
Future Gener. Comput. Syst., 2023

2022
Semi-Synchronized Non-Blocking Concurrent Kernel Cruising.
IEEE Trans. Cloud Comput., 2022

MaliCage: A packed malware family classification framework based on DNN and GAN.
J. Inf. Secur. Appl., 2022

CJSpector: A Novel Cryptojacking Detection Method Using Hardware Trace and Deep Learning.
J. Grid Comput., 2022

MDCD: A malware detection approach in cloud using deep learning.
Trans. Emerg. Telecommun. Technol., 2022

Calculation of utility of network services based on state manifolds.
Comput. Networks, 2022

2021
BinDeep: A deep learning approach to binary code similarity detection.
Expert Syst. Appl., 2021

CMFuzz: context-aware adaptive mutation for fuzzers.
Empir. Softw. Eng., 2021

Riemannian manifold on stream data: Fourier transform and entropy-based DDoS attacks detection method.
Comput. Secur., 2021

HBRSS: Providing high-secure data communication and manipulation in insecure cloud environments.
Comput. Commun., 2021

MDCHD: A novel malware detection method in cloud using hardware trace and deep learning.
Comput. Networks, 2021

2020
Malware classification for the cloud via semi-supervised transfer learning.
J. Inf. Secur. Appl., 2020

LAFuzz: Neural Network for Efficient Fuzzing.
Proceedings of the 32nd IEEE International Conference on Tools with Artificial Intelligence, 2020

2019
Establishing a software defect prediction model via effective dimension reduction.
Inf. Sci., 2019

DEPLEST: A blockchain-based privacy-preserving distributed database toward user behaviors in social networks.
Inf. Sci., 2019

Dynamic defense strategy against advanced persistent threat under heterogeneous networks.
Inf. Fusion, 2019

KEcruiser: A novel control flow protection for kernel extensions.
Future Gener. Comput. Syst., 2019

An online approach to defeating ROP attacks∗.
Concurr. Comput. Pract. Exp., 2019

Software structure characteristic measurement method based on weighted network.
Comput. Networks, 2019

Predicting blood pressure from physiological index data using the SVR algorithm.
BMC Bioinform., 2019

A Kernel Rootkit Detection Approach Based on Virtualization and Machine Learning.
IEEE Access, 2019

Network Security Situation Prediction Based on MR-SVM.
IEEE Access, 2019

An Adaptive Ensemble Machine Learning Model for Intrusion Detection.
IEEE Access, 2019

A Vulnerability Detection Model for Java Systems Based on Complex Networks.
Proceedings of the 2019 IEEE SmartWorld, 2019

Segmental Symbolic Execution Based on Clustering.
Proceedings of the 2019 IEEE SmartWorld, 2019

An Improved Prediction Model for the Network Security Situation.
Proceedings of the Smart Computing and Communication - 4th International Conference, 2019

2018
A policy-centric approach to protecting OS kernel from vulnerable LKMs.
Softw. Pract. Exp., 2018

Security Feature Measurement for Frequent Dynamic Execution Paths in Software System.
Secur. Commun. Networks, 2018

A Dynamic Hidden Forwarding Path Planning Method Based on Improved Q-Learning in SDN Environments.
Secur. Commun. Networks, 2018

Approach to Mine the Modularity of Software Network Based on the Most Vital Nodes.
IEEE Access, 2018

Software System Representation Methods Based on Algebraic Component.
Proceedings of the 17th IEEE International Conference On Trust, 2018

An Effective Method to Generate Simulated Attack Data Based on Generative Adversarial Nets.
Proceedings of the 17th IEEE International Conference On Trust, 2018

An Improved Monte Carlo Graph Search Algorithm for Optimal Attack Path Analysis.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Establishing an Optimal Network Defense System: A Monte Carlo Graph Search Method.
Proceedings of the Science of Cyber Security - First International Conference, 2018

An Attack Graph Generation Method Based on Parallel Computing.
Proceedings of the Science of Cyber Security - First International Conference, 2018

A Partition Matching Method for Optimal Attack Path Analysis.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

A Monte Carlo Graph Search Algorithm with Ant Colony Optimization for Optimal Attack Path Analysis.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

A Double-Layer Detection and Classification Approach for Network Attacks.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

2017
An Online Approach for Kernel-level Keylogger Detection and Defense.
J. Inf. Sci. Eng., 2017

A Driver Model Based on Emotion.
Proceedings of the Advances in Swarm Intelligence - 8th International Conference, 2017

A Quantitative Method for Evaluating Network Security Based on Attack Graph.
Proceedings of the Network and System Security - 11th International Conference, 2017

An Automatic Vulnerabilities Classification Method Based on Their Relevance.
Proceedings of the Network and System Security - 11th International Conference, 2017

A Practical Method to Confine Sensitive API Invocations on Commodity Hardware.
Proceedings of the Network and System Security - 11th International Conference, 2017

A Detecting Method of Array Bounds Defects Based on Symbolic Execution.
Proceedings of the Network and System Security - 11th International Conference, 2017

SulleyEX: A Fuzzer for Stateful Network Protocol.
Proceedings of the Network and System Security - 11th International Conference, 2017

Defenses Against Wormhole Attacks in Wireless Sensor Networks.
Proceedings of the Network and System Security - 11th International Conference, 2017

Optimal Attack Path Generation Based on Supervised Kohonen Neural Network.
Proceedings of the Network and System Security - 11th International Conference, 2017

Anti-Jamming Power Control Game in Unmanned Aerial Vehicle Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Predicting Vulnerable Software Components Using Software Network Graph.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

An Online Approach to Defeating Return-Oriented-Programming Attacks.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Mining Frequent Intra-Sequence and Inter-Sequence Patterns Using Bitmap with a Maximal Span.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017

Mining Frequent Patterns for Item-Oriented and Customer-Oriented Analysis.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017

2016
A Secure and Efficient Kernel Log Transfer Mechanism for Virtualization Environments.
J. Inf. Sci. Eng., 2016

Optimization of program recursive function calls analysis method.
Autom. Control. Comput. Sci., 2016

2015
An Improved WiFi Indoor Positioning Algorithm by Weighted Fusion.
Sensors, 2015

Dynamic Tracking Reinforcement Based on Simplified Control Flow.
Proceedings of the 11th International Conference on Computational Intelligence and Security, 2015

Dynamic Binary Instrumentation Based Defense Solution against Virtual Function Table Hijacking Attacks at C++ Binary Programs.
Proceedings of the 10th International Conference on P2P, 2015

2014
Approach for malware identification using dynamic behaviour and outcome triggering.
IET Inf. Secur., 2014

A Virtualization-Based Approach for Application Whitelisting.
IEICE Trans. Inf. Syst., 2014

iCruiser: An Improved Approach for Concurrent Heap Buffer Overflow Monitoring.
IEICE Trans. Inf. Syst., 2014

Defeating buffer overflow attacks via virtualization.
Comput. Electr. Eng., 2014

Software Behavior Model Measuring Approach of Combining Structural Analysis and Language Set.
Proceedings of the Trusted Systems - 6th International Conference, 2014

2013
Efficient Shellcode Detection on Commodity Hardware.
IEICE Trans. Inf. Syst., 2013

A Dynamic Detection Method to C/C++ Programs Memory Vulnerabilities Based on Pointer Analysis.
Proceedings of the IEEE 11th International Conference on Dependable, 2013

2012
Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

2011
Boosting performance in attack intention recognition by integrating multiple techniques.
Frontiers Comput. Sci. China, 2011

Memory errors prevention technology for C/C++ program based on probability.
Proceedings of the 7th International Conference on Natural Language Processing and Knowledge Engineering, 2011

Policy-Centric Protection of OS Kernel from Vulnerable Loadable Kernel Modules.
Proceedings of the Information Security Practice and Experience, 2011

2010
Binary Oriented Vulnerability Analyzer Based on Hidden Markov Model.
IEICE Trans. Inf. Syst., 2010

A Clustering Algorithm Based on Matrix over High Dimensional Data Stream.
Proceedings of the Web Information Systems and Mining - International Conference, 2010

Protecting Kernel Data through Virtualization Technology.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010

Integrating Offline Analysis and Online Protection to Defeat Buffer Overflow Attacks.
Proceedings of the Information Security - 13th International Conference, 2010

2009
Software Fault Feature Clustering Algorithm Based on Sequence Pattern.
Proceedings of the Web Information Systems and Mining, International Conference, 2009

An Approach for Database Intrusion Detection Based on the Event Sequence Clustering.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Metamorphic malware detection technology based on aggregating emerging patterns.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

Efficient Outlier Detection Algorithm for Heterogeneous Data Streams.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

An Improved OLAP Join and Aggregate Algorithm Based on Dimension Hierarchy.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

A Method for Analyzing Software Faults Based on Mining Outliers' Feature Attribute Sets.
Proceedings of the Active Media Technology, 5th International Conference, 2009

Hierarchical Distributed Alert Correlation Model.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009


  Loading...