Chao Chen
Orcid: 0000-0003-1355-3870Affiliations:
- RMIT University, Melbourne, VIC, Australia
- James Cook University, Townsville, QLD, Australia (former)
- Swinburne University of Technology, School of Software and Electrical Engineering, Hawthorn, VIC, Australia (former)
- Deakin University, Geelong, Australia (former)
According to our database1,
Chao Chen
authored at least 72 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Internet Things J., March, 2024
Reverse Backdoor Distillation: Towards Online Backdoor Attack Detection for Deep Neural Network Models.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Matrix factorization recommender based on adaptive Gaussian differential privacy for implicit feedback.
Inf. Process. Manag., 2024
Detector Collapse: Backdooring Object Detection to Catastrophic Overload or Blindness.
CoRR, 2024
Proceedings of the Web Information Systems Engineering - WISE 2024, 2024
Clustering-based Evaluation Framework of Feature Extraction Approaches for ECG Biometric Authentication.
Proceedings of the International Joint Conference on Neural Networks, 2024
Detector Collapse: Backdooring Object Detection to Catastrophic Overload or Blindness in the Physical World.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
2023
Comput. Secur., November, 2023
Real-Time Detection of COVID-19 Events From Twitter: A Spatial-Temporally Bursty-Aware Method.
IEEE Trans. Comput. Soc. Syst., April, 2023
Personalized Location Privacy Protection for Location-Based Services in Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., January, 2023
Int. J. Netw. Manag., 2023
Capturing Dynamics of Information Diffusion in SNS: A Survey of Methodology and Techniques.
ACM Comput. Surv., 2023
A survey on privacy inference attacks and defenses in cloud-based Deep Neural Network.
Comput. Stand. Interfaces, 2023
Proceedings of the 26th International Symposium on Research in Attacks, 2023
SigD: A Cross-Session Dataset for PPG-based User Authentication in Different Demographic Groups.
Proceedings of the International Joint Conference on Neural Networks, 2023
Denial-of-Service or Fine-Grained Control: Towards Flexible Model Poisoning Attacks on Federated Learning.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
Proceedings of the Third International Symposium on Advanced Security on Software and Systems, 2023
2022
ACM Trans. Manag. Inf. Syst., 2022
Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey.
IEEE CAA J. Autom. Sinica, 2022
ACM Comput. Surv., 2022
Event detection in online social network: Methodologies, state-of-art, and evolution.
Comput. Sci. Rev., 2022
CoRR, 2022
Proceedings of the Network and System Security - 16th International Conference, 2022
Proceedings of the Algorithms and Architectures for Parallel Processing, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022
Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, 2022
2021
The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services.
Proc. Priv. Enhancing Technol., 2021
Information flow based defensive chain for data leakage detection and prevention: a survey.
CoRR, 2021
CoRR, 2021
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021
Proceedings of the Cyberspace Safety and Security - 13th International Symposium, 2021
2020
IEEE Trans. Ind. Informatics, 2020
Doc2vec-based Insider Threat Detection through Behaviour Analysis of Multi-source Security Logs.
Proceedings of the 19th IEEE International Conference on Trust, 2020
2019
CoRR, 2019
A performance evaluation of deep-learnt features for software vulnerability detection.
Concurr. Comput. Pract. Exp., 2019
Insider Threat Identification Using the Simultaneous Neural Learning of Multi-Source Logs.
IEEE Access, 2019
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019
Unsupervised Insider Detection Through Neural Feature Learning and Model Optimisation.
Proceedings of the Network and System Security - 13th International Conference, 2019
2018
Proceedings of the 2018 International Symposium on Security and Privacy in Social Networks and Big Data, 2018
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
Energy-aware scheduling of virtual machines in heterogeneous cloud computing systems.
Future Gener. Comput. Syst., 2017
Future Gener. Comput. Syst., 2017
Addressing the class imbalance problem in Twitter spam detection using ensemble learning.
Comput. Secur., 2017
2016
Proceedings of the Network and System Security - 10th International Conference, 2016
An Ensemble Learning Approach for Addressing the Class Imbalance Problem in Twitter Spam Detection.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
IEEE Trans. Comput. Soc. Syst., 2015
A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks.
IEEE Trans. Computers, 2015
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
2014
On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classification.
Proceedings of the Network and System Security - 8th International Conference, 2014
2013
IEEE Trans. Netw. Serv. Manag., 2013
IEEE Trans. Inf. Forensics Secur., 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
Int. J. Secur. Networks, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012