Chenghua Tang

According to our database1, Chenghua Tang authored at least 23 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An Adversarial and Deep Hashing-based Hierarchical Supervised Cross-Modal Image and Text Retrieval Algorithm.
Int. J. Robotics Autom., 2024

PBDG: a malicious code detection method based on precise behaviour dependency graph.
Int. J. Inf. Comput. Secur., 2024

Malicious program ontology rule set based on association decision and linear discriminant.
Int. J. Electron. Secur. Digit. Forensics, 2024

2023
Android static taint analysis based on multi branch search association.
Comput. Secur., June, 2023

SPoFC: A framework for stream data aggregation with local differential privacy.
Concurr. Comput. Pract. Exp., February, 2023

K-Means Clustering with Local Distance Privacy.
Big Data Min. Anal., 2023

2022
Malicious Family Identify Combining Multi-channel Mapping Feature Image and Fine-Tuned CNN.
Proceedings of the IEEE International Conference on Trust, 2022

2021
Attention Mechanism-Based CNN-LSTM Model for Wind Turbine Fault Prediction Using SSN Ontology Annotation.
Wirel. Commun. Mob. Comput., 2021

2018
A Dual SIS Epidemic Model for Virus Spread Analysis in Cluster-Based Wireless Sensor Networks.
Proceedings of the Machine Learning and Intelligent Communications, 2018

2016
Detection and classification of anomaly intrusion using hierarchy clustering and SVM.
Secur. Commun. Networks, 2016

一种跨域网络资源的安全互操作模型 (Security Interoperation Model of Cross-domain Network Resources).
计算机科学, 2016

Impact of sensing errors on the performance of an unreliable opportunistic spectrum sharing system.
Int. J. Wirel. Mob. Comput., 2016

2015
基于语义相似度的静态安全策略一致性检测 (Static Security Policy Consistency Detection Based on Semantic Similarity).
计算机科学, 2015

一种基于软集和多属性综合的软件漏洞发现方法 (Method for Software Vulnerability Discovery Based on Soft Set and Multi-attribute Comprehensiveness).
计算机科学, 2015

一种基于GA-FAHP的软件漏洞风险评估方法 (Risk Assessment of Software Vulnerability Based on GA-FAHP).
计算机科学, 2015

2013
Modeling Web Session for Detecting Pseudo HTTP Traffic.
J. Comput., 2013

Analysis of TDOA based radar target positioning in LOS and NLOS environments.
Int. J. Wirel. Mob. Comput., 2013

2012
A Comparative Study of Power Line Communication Networks With and Without Buffer.
Int. J. Commun. Networks Inf. Secur., 2012

2011
Implementation and Realization of Network Security Policy Based on Rule Engine.
J. Networks, 2011

Modeling and Analysis of Network Security Situation Prediction Based on Covariance Likelihood Neural.
Proceedings of the Bio-Inspired Computing and Applications, 2011

2008
A Dynamic and Self-Adaptive Network Security Policy Realization Mechanism.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

Assessment of Network Security Policy Based on Security Capability.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2006
A Network Security Policy Model and Its Realization Mechanism.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006


  Loading...