Chundong Wang
Orcid: 0000-0001-8170-3020Affiliations:
- Tianjin University of Technology, Ministry of Education, Key Laboratory of Computer Vision and System, China
- Nankai University, Department of Computer Science, China (PhD 2007)
According to our database1,
Chundong Wang
authored at least 54 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Inf. Process. Manag., March, 2024
WordIllusion: An adversarial text generation algorithm based on human cognitive system.
Cogn. Syst. Res., January, 2024
DIGWO-N-BEATS: An evolutionary time series prediction method for situation prediction.
Inf. Sci., 2024
Simplices-based higher-order enhancement graph neural network for multi-behavior recommendation.
Inf. Process. Manag., 2024
Protecting privacy and enhancing utility: A novel approach for personalized trajectory data publishing using noisy prefix tree.
Comput. Secur., 2024
IEEE Access, 2024
2023
Softw. Impacts, September, 2023
IMGC-GNN: A multi-granularity coupled graph neural network recommendation method based on implicit relationships.
Appl. Intell., June, 2023
A novel personality detection method based on high-dimensional psycholinguistic features and improved distributed Gray Wolf Optimizer for feature selection.
Inf. Process. Manag., 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
A Copyright Authentication Method Balancing Watermark Robustness and Data Distortion.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
2022
Soft Comput., 2022
Unreachable Peers Communication Scheme in Decentralized Networks Based on Peer-to-Peer Overlay Approaches.
Future Internet, 2022
Proceedings of the IEEE Smartworld, 2022
2021
Mob. Networks Appl., 2021
Mob. Networks Appl., 2021
2020
An activity theory model for dynamic evolution of attack graph based on improved least square genetic algorithm.
Int. J. Inf. Comput. Secur., 2020
Int. J. Inf. Comput. Secur., 2020
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020
Proceedings of the Database Systems for Advanced Applications, 2020
Proceedings of the CCRIS 2020: International Conference on Control, 2020
2019
Int. J. Embed. Syst., 2019
The extraction of security situation in heterogeneous log based on Str-FSFDP density peak cluster.
Int. J. Comput. Sci. Eng., 2019
EURASIP J. Inf. Secur., 2019
Clust. Comput., 2019
2018
Sensors, 2018
J. Internet Serv. Inf. Secur., 2018
IEEE Access, 2018
LAMP: Lightweight and Accurate Malicious Access Points Localization via Channel Phase Information.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018
Proceedings of the 2018 IEEE International Conference on Smart Internet of Things (SmartIoT), 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
2017
Entropy, 2017
An android malware dynamic detection method based on service call co-occurrence matrices.
Ann. des Télécommunications, 2017
Proceedings of the Data Science, 2017
2014
Int. J. High Perform. Syst. Archit., 2014
Int. J. Commun. Networks Distributed Syst., 2014
The application of dynamic password technology based on ECC algorithm in mobile payment.
Int. J. Commun. Networks Distributed Syst., 2014
2013
Security Analysis and Improvement for Kerberos Based on Dynamic Password and Diffie-Hellman Algorithm.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
2012
Virtual Machine-based Intrusion Detection System Framework in Cloud Computing Environment.
J. Comput., 2012
2009
Proceedings of the Fifth International Conference on Natural Computation, 2009
Proceedings of the Fifth International Conference on Natural Computation, 2009
Proceedings of the Fifth International Conference on Natural Computation, 2009
A Wireless Network Congestion Control Algorithm Based on Adaptive QoS and Wireless Bandwidth.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009
A New Algorithm Combining Self Organizing Map with Simulated Annealing Used in Intrusion Detection.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009
2008
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008
2007
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
Proceedings of the Embedded and Ubiquitous Computing, International Conference, 2007