Chenghua Tang
According to our database1,
Chenghua Tang
authored at least 23 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
An Adversarial and Deep Hashing-based Hierarchical Supervised Cross-Modal Image and Text Retrieval Algorithm.
Int. J. Robotics Autom., 2024
Int. J. Inf. Comput. Secur., 2024
Malicious program ontology rule set based on association decision and linear discriminant.
Int. J. Electron. Secur. Digit. Forensics, 2024
2023
Comput. Secur., June, 2023
Concurr. Comput. Pract. Exp., February, 2023
2022
Malicious Family Identify Combining Multi-channel Mapping Feature Image and Fine-Tuned CNN.
Proceedings of the IEEE International Conference on Trust, 2022
2021
Attention Mechanism-Based CNN-LSTM Model for Wind Turbine Fault Prediction Using SSN Ontology Annotation.
Wirel. Commun. Mob. Comput., 2021
2018
A Dual SIS Epidemic Model for Virus Spread Analysis in Cluster-Based Wireless Sensor Networks.
Proceedings of the Machine Learning and Intelligent Communications, 2018
2016
Detection and classification of anomaly intrusion using hierarchy clustering and SVM.
Secur. Commun. Networks, 2016
计算机科学, 2016
Impact of sensing errors on the performance of an unreliable opportunistic spectrum sharing system.
Int. J. Wirel. Mob. Comput., 2016
2015
基于语义相似度的静态安全策略一致性检测 (Static Security Policy Consistency Detection Based on Semantic Similarity).
计算机科学, 2015
一种基于软集和多属性综合的软件漏洞发现方法 (Method for Software Vulnerability Discovery Based on Soft Set and Multi-attribute Comprehensiveness).
计算机科学, 2015
计算机科学, 2015
2013
Int. J. Wirel. Mob. Comput., 2013
2012
Int. J. Commun. Networks Inf. Secur., 2012
2011
J. Networks, 2011
Modeling and Analysis of Network Security Situation Prediction Based on Covariance Likelihood Neural.
Proceedings of the Bio-Inspired Computing and Applications, 2011
2008
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008
Proceedings of the International Conference on Computer Science and Software Engineering, 2008
2006
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006