Chengxiang Si

According to our database1, Chengxiang Si authored at least 31 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Blockchain-Based Covert Communication: A Detection Attack and Efficient Improvement.
IEEE Trans. Inf. Forensics Secur., 2024

MTDM-MS: A Malicious Traffic Detection Model Based on Multi-Category Signals.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024

A Targeted Adversarial Attack Method for Multi-Classification Malicious Traffic Detection.
Proceedings of the IEEE International Conference on Acoustics, 2024

MLMTD: A Multi-Layer Malicious Traffic Detection Model Based on Multi-Branch Octave Convolution and Attention Mechanism.
Proceedings of the IEEE International Conference on Acoustics, 2024

2022
A Secure and Anonymous Communicate Scheme over the Internet of Things.
ACM Trans. Sens. Networks, 2022

ABCAttack: A Gradient-Free Optimization Black-Box Attack for Fooling Deep Image Classifiers.
Entropy, 2022

MateGraph: Toward Mobile Malware Detection Through Traffic Behavior Graph.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

2021
DBUL: A User Identity Linkage Method across Social Networks Based on Spatiotemporal Data.
Proceedings of the 33rd IEEE International Conference on Tools with Artificial Intelligence, 2021

SDCCD: Spatiotemporal Data Cleaning based on Collision Detection.
Proceedings of the 15th IEEE International Conference on Big Data Science and Engineering, 2021

KMUL: A User Identity Linkage Method across Social Networks Based on Spatiotemporal Data.
Proceedings of the 15th IEEE International Conference on Big Data Science and Engineering, 2021

2020
Waving Gesture Analysis for User Authentication in the Mobile Environment.
IEEE Netw., 2020

Identifying vulnerabilities of SSL/TLS certificate verification in Android apps with static and dynamic analysis.
J. Syst. Softw., 2020

Passive browser identification with multi-scale Convolutional Neural Networks.
Neurocomputing, 2020

<i>DAF</i>: An adaptive computing framework for multimedia data streams analysis.
Intell. Data Anal., 2020

A lightweight and aggregated system for indoor/outdoor detection using smart devices.
Future Gener. Comput. Syst., 2020

Robust Reasoning Over Heterogeneous Textual Information for Fact Verification.
IEEE Access, 2020

MG-Hybrid: A Strongly Connected Components Detection Algorithm using Multiple GPUs.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2020

Parallel Belief Propagation Optimized by Coloring on GPUs.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

2019
Understanding Effects of Collaborations in Developing Mobile Computing Systems: Popularity, Efficiency, and Quality.
IEEE Access, 2019

Deanonymizing Tor in a Stealthy Way.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

2013
PIN-Cache: An Effective Cache Scheme Designed for Application Performance Insulation.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

ADS-B Data Authentication Based on AH Protocol.
Proceedings of the IEEE 11th International Conference on Dependable, 2013

2012
The survey of cache management in the shared storage environment.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

2010
An Effective, Low-Overhead, Improved Replacement Algorithm for Mail Service Applications in Storage System.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2010

2009
Enhancing the Scalability of Blue Whale Cluster File System in Video-editing Environment.
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009

P-Cache: Providing Prioritized Caching Service for Storage System.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

A Replacement Algorithm Designed for the Web Search Engine and Its Application in Storage Cache.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

<i>BW-DCache</i>: An Inexpensive, Effective and Reliable Cache Solution in a SAN File System.
Proceedings of the High Performance Computing Systems and Applications, 2009

Volume Based Metadata Isolation in Blue Whale Cluster File System.
Proceedings of the 11th IEEE International Conference on High Performance Computing and Communications, 2009

A Flexible Two-Layer Buffer Caching Scheme for Shared Storage Cache.
Proceedings of the 11th IEEE International Conference on High Performance Computing and Communications, 2009

2008
A Novel Network RAID Architecture with Out-of-Band Virtualization and Redundant Management.
Proceedings of the 14th International Conference on Parallel and Distributed Systems, 2008


  Loading...