Chonghua Wang

Orcid: 0000-0001-9797-6736

According to our database1, Chonghua Wang authored at least 27 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Ada-LEval: Evaluating long-context LLMs with length-adaptable benchmarks.
Proceedings of the 2024 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (Volume 1: Long Papers), 2024

BotChat: Evaluating LLMs' Capabilities of Having Multi-Turn Dialogues.
Proceedings of the Findings of the Association for Computational Linguistics: NAACL 2024, 2024

2023
<i>WaterPurifier</i>: A scalable system to prevent the DNS water torture attack in 5G-enabled SIoT network.
Comput. Commun., February, 2023

HubRouter: Learning Global Routing via Hub Generation and Pin-hub Connection.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

2022
Network traffic analysis over clustering-based collective anomaly detection.
Comput. Networks, 2022

MCFM: Discover Sensitive Behavior from Encrypted Traffic in Industrial Control System.
Proceedings of the IEEE International Conference on Trust, 2022

Anomaly Detection in Encrypted Identity Resolution Traffic based on Machine Learning.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

A virtualization-based security architecture for industrial control systems.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

WREP: A lightweight event real-time processing engine for IoT.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

2021
An efficient identity-based proxy signcryption using lattice.
Future Gener. Comput. Syst., 2021

Caps-LSTM: A Novel Hierarchical Encrypted VPN Network Traffic Identification Using CapsNet and LSTM.
Proceedings of the Science of Cyber Security - Third International Conference, 2021

2020
A Lightweight Privacy-Preserving Communication Protocol for Heterogeneous IoT Environment.
IEEE Access, 2020

STIDM: A Spatial and Temporal Aware Intrusion Detection Model.
Proceedings of the 19th IEEE International Conference on Trust, 2020

pRnR: A Parallel Record-Replay Framework for Virtual Machines.
Proceedings of the 38th IEEE International Conference on Computer Design, 2020

StateConsisIV: A Privacy-preserving Integrity Verification Method for Cloud Components Based on a Novel State Consistency Feature.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

Network Security Situation Awareness Technology Based on Multi-source Heterogeneous Data.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

Identification of important nodes on large-scale Internet based on unsupervised learning.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

2019
HProve: A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware.
EAI Endorsed Trans. Security Safety, 2019

When Side Channel Becomes Good: Kernel Malware Attack Investigation.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

2017
Introspection-Based Memory Pruning for Live VM Migration.
Int. J. Parallel Program., 2017

A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware.
Proceedings of the Security and Privacy in Communication Networks, 2017

SA-PFRS: Semantics-Aware Page Frame Reclamation System in Virtualized Environments.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017

NOR: Towards Non-intrusive, Real-Time and OS-agnostic Introspection for Virtual Machines in Cloud Environment.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

2016
A Hybrid Monitoring Mechanism in Virtualized Environments.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Piccolo: A Fast and Efficient Rollback System for Virtual Machine Clusters.
Proceedings of the 45th International Conference on Parallel Processing, 2016

RTPMF: Leveraging User and Message Embeddings for Retweeting Behavior Prediction.
Proceedings of the International Conference on Computational Science 2016, 2016

2015
Exploring Efficient and Robust Virtual Machine Introspection Techniques.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015


  Loading...