Changzhen Hu
Orcid: 0009-0006-8646-7489
According to our database1,
Changzhen Hu
authored at least 93 papers
between 2009 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
J. Netw. Comput. Appl., 2025
2024
A Novel Dynamic Event-Triggered Dissipative Filtering for T-S Fuzzy Systems with Asynchronous Constraints.
Int. J. Fuzzy Syst., October, 2024
Packet header-based reweight-long short term memory (Rew-LSTM) method for encrypted network traffic classification.
Computing, August, 2024
Event-Based Distributed Set-Membership Estimation for Complex Networks Under Deception Attacks.
IEEE Trans Autom. Sci. Eng., July, 2024
A blockchain-based ubiquitous entity authentication and management scheme with homomorphic encryption for FANET.
Peer Peer Netw. Appl., March, 2024
Event-Based Distributed Set-Membership Estimation for Complex Networks: A Coding-Decoding Method.
IEEE Trans. Netw. Sci. Eng., 2024
IEEE Trans. Cloud Comput., 2024
MDGraph: A novel malware detection method based on memory dump and graph neural network.
Expert Syst. Appl., 2024
TEDA: a trusted execution environment-and-blockchain-based data protection architecture for Internet of Things.
Computing, 2024
Comput. Commun., 2024
Component-based modeling of cascading failure propagation in directed dual-weight software networks.
Comput. Networks, 2024
2023
DEFIA: Evaluate defense effectiveness by fusing behavior information of cyberattacks.
Inf. Sci., October, 2023
ADCaDeM: A Novel Method of Calculating Attack Damage Based on Differential Manifolds.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Internet Things J., 2023
TEBDS: A Trusted Execution Environment-and-Blockchain-supported IoT data sharing system.
Future Gener. Comput. Syst., 2023
2022
IEEE Trans. Cloud Comput., 2022
J. Inf. Secur. Appl., 2022
CJSpector: A Novel Cryptojacking Detection Method Using Hardware Trace and Deep Learning.
J. Grid Comput., 2022
Trans. Emerg. Telecommun. Technol., 2022
Comput. Networks, 2022
2021
Expert Syst. Appl., 2021
Riemannian manifold on stream data: Fourier transform and entropy-based DDoS attacks detection method.
Comput. Secur., 2021
HBRSS: Providing high-secure data communication and manipulation in insecure cloud environments.
Comput. Commun., 2021
MDCHD: A novel malware detection method in cloud using hardware trace and deep learning.
Comput. Networks, 2021
2020
J. Inf. Secur. Appl., 2020
Proceedings of the 32nd IEEE International Conference on Tools with Artificial Intelligence, 2020
2019
Inf. Sci., 2019
DEPLEST: A blockchain-based privacy-preserving distributed database toward user behaviors in social networks.
Inf. Sci., 2019
Dynamic defense strategy against advanced persistent threat under heterogeneous networks.
Inf. Fusion, 2019
Future Gener. Comput. Syst., 2019
Comput. Networks, 2019
BMC Bioinform., 2019
IEEE Access, 2019
IEEE Access, 2019
Proceedings of the 2019 IEEE SmartWorld, 2019
Proceedings of the 2019 IEEE SmartWorld, 2019
Proceedings of the Smart Computing and Communication - 4th International Conference, 2019
2018
Softw. Pract. Exp., 2018
Security Feature Measurement for Frequent Dynamic Execution Paths in Software System.
Secur. Commun. Networks, 2018
A Dynamic Hidden Forwarding Path Planning Method Based on Improved Q-Learning in SDN Environments.
Secur. Commun. Networks, 2018
IEEE Access, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
An Effective Method to Generate Simulated Attack Data Based on Generative Adversarial Nets.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the Science of Cyber Security - First International Conference, 2018
Proceedings of the Science of Cyber Security - First International Conference, 2018
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018
A Monte Carlo Graph Search Algorithm with Ant Colony Optimization for Optimal Attack Path Analysis.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
2017
J. Inf. Sci. Eng., 2017
Proceedings of the Advances in Swarm Intelligence - 8th International Conference, 2017
Proceedings of the Network and System Security - 11th International Conference, 2017
Proceedings of the Network and System Security - 11th International Conference, 2017
Proceedings of the Network and System Security - 11th International Conference, 2017
Proceedings of the Network and System Security - 11th International Conference, 2017
Proceedings of the Network and System Security - 11th International Conference, 2017
Proceedings of the Network and System Security - 11th International Conference, 2017
Proceedings of the Network and System Security - 11th International Conference, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
Mining Frequent Intra-Sequence and Inter-Sequence Patterns Using Bitmap with a Maximal Span.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017
Proceedings of the 14th Web Information Systems and Applications Conference, 2017
2016
A Secure and Efficient Kernel Log Transfer Mechanism for Virtualization Environments.
J. Inf. Sci. Eng., 2016
Autom. Control. Comput. Sci., 2016
2015
Proceedings of the 11th International Conference on Computational Intelligence and Security, 2015
Dynamic Binary Instrumentation Based Defense Solution against Virtual Function Table Hijacking Attacks at C++ Binary Programs.
Proceedings of the 10th International Conference on P2P, 2015
2014
IET Inf. Secur., 2014
IEICE Trans. Inf. Syst., 2014
IEICE Trans. Inf. Syst., 2014
Software Behavior Model Measuring Approach of Combining Structural Analysis and Language Set.
Proceedings of the Trusted Systems - 6th International Conference, 2014
2013
A Dynamic Detection Method to C/C++ Programs Memory Vulnerabilities Based on Pointer Analysis.
Proceedings of the IEEE 11th International Conference on Dependable, 2013
2012
Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
2011
Boosting performance in attack intention recognition by integrating multiple techniques.
Frontiers Comput. Sci. China, 2011
Proceedings of the 7th International Conference on Natural Language Processing and Knowledge Engineering, 2011
Proceedings of the Information Security Practice and Experience, 2011
2010
IEICE Trans. Inf. Syst., 2010
Proceedings of the Web Information Systems and Mining - International Conference, 2010
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010
Integrating Offline Analysis and Online Protection to Defeat Buffer Overflow Attacks.
Proceedings of the Information Security - 13th International Conference, 2010
2009
Proceedings of the Web Information Systems and Mining, International Conference, 2009
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009
A Method for Analyzing Software Faults Based on Mining Outliers' Feature Attribute Sets.
Proceedings of the Active Media Technology, 5th International Conference, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009