Chengxiang Tan
Orcid: 0009-0001-9949-3620
According to our database1,
Chengxiang Tan
authored at least 32 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Unawareness detection: Discovering black-box malicious models and quantifying privacy leakage risks.
Comput. Secur., February, 2024
Type-Enhanced Ensemble Triple Representation via Triple-Aware Attention for Cross-Lingual Entity Alignment.
IEICE Trans. Inf. Syst., 2024
Optimizing Label-Only Membership Inference Attacks by Global Relative Decision Boundary Distances.
Proceedings of the Information Security - 27th International Conference, 2024
Proceedings of the 2024 16th International Conference on Machine Learning and Computing, 2024
Continual Few-shot Relation Extraction via Adaptive Gradient Correction and Knowledge Decomposition.
Proceedings of the Findings of the Association for Computational Linguistics, 2024
2023
OTIEA: Ontology-enhanced Triple Intrinsic-Correlation for Cross-lingual Entity Alignment.
CoRR, 2023
Type-enhanced Ensemble Triple Representation via Triple-aware Attention for Cross-lingual Entity Alignment.
CoRR, 2023
2021
J. Intell. Fuzzy Syst., 2021
A hierarchical method for assessing cyber security situation based on ontology and fuzzy cognitive maps.
Int. J. Inf. Comput. Secur., 2021
2020
Heterogeneous Identity Expression and Association Method Based on Attribute Aggregation "In Prepress".
J. Web Eng., 2020
Joint Entity and Relation Extraction with a Hybrid Transformer and Reinforcement Learning Based Model.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
2019
An improved network security situation assessment approach in software defined networks.
Peer-to-Peer Netw. Appl., 2019
Discovery method for distributed denial-of-service attack behavior in SDNs using a feature-pattern graph model.
Frontiers Inf. Technol. Electron. Eng., 2019
Decentralized attribute-based conjunctive keyword search scheme with online/offline encryption and outsource decryption for cloud computing.
Future Gener. Comput. Syst., 2019
2018
Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation.
Sensors, 2018
Secure Multi-Authority Data Access Control Scheme in Cloud Storage System Based on Attribute-Based Signcryption.
IEEE Access, 2018
Proceedings of the 2018 International Conference on Security, 2018
Proceedings of the 2018 International Conference on Security, 2018
Proceedings of the 2018 International Conference on Security, 2018
2017
2015
Sensors, 2015
基于动态权限集的Android强制访问控制模型 (Mandatory Access Control Model for Android Based on Dynamic Privilege Set).
计算机科学, 2015
2012
J. Networks, 2012
2011
J. Networks, 2011
2010
Proceedings of the 2010 International Conference on Machine Vision and Human-machine Interface, 2010
2009
Proceedings of the 2009 IITA International Conference on Services Science, 2009
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009
2008
Proceedings of the International Workshop on Knowledge Discovery and Data Mining, 2008
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008
Cryptanalysis and Improvement of an 'Efficient Remote Mutual Authentication and Key Agreement'.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008