Chunhe Xia
Orcid: 0000-0003-4424-8449
According to our database1,
Chunhe Xia
authored at least 89 papers
between 2006 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
J. Parallel Distributed Comput., 2025
HIDIM: A novel framework of network intrusion detection for hierarchical dependency and class imbalance.
Comput. Secur., 2025
2024
GRASS: Learning Spatial-Temporal Properties From Chainlike Cascade Data for Microscopic Diffusion Prediction.
IEEE Trans. Neural Networks Learn. Syst., November, 2024
Secure Data Integrity Check Based on Verified Public Key Encryption With Equality Test for Multi-Cloud Storage.
IEEE Trans. Dependable Secur. Comput., 2024
FedDADP: A Privacy-Risk-Adaptive Differential Privacy Protection Method for Federated Android Malware Classifier.
Proceedings of the International Joint Conference on Neural Networks, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Multi-Signal Fusion of Social Diffusion Graph with Bi-Directional Semantic Consistency.
Proceedings of the IEEE International Conference on Acoustics, 2024
FedDRC: A Robust Federated Learning-based Android Malware Classifier under Heterogeneous Distribution.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
2023
FedDroidMeter: A Privacy Risk Evaluator for FL-Based Android Malware Classification Systems.
Entropy, July, 2023
From the Dialectical Perspective: Modeling and Exploiting of Hybrid Worm Propagation.
IEEE Trans. Inf. Forensics Secur., 2023
Capturing Dynamics of Information Diffusion in SNS: A Survey of Methodology and Techniques.
ACM Comput. Surv., 2023
FBChain: A Blockchain-based Federated Learning Model with Efficiency and Secure Communication.
CoRR, 2023
HF-Mid: A Hybrid Framework of Network Intrusion Detection for Multi-type and Imbalanced Data.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
REDA: Malicious Traffic Detection Based on Record Length and Frequency Domain Analysis.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
FedDLM: A Fine-Grained Assessment Scheme for Risk of Sensitive Information Leakage in Federated Learning-based Android Malware Classifier.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
FedDroidADP: An Adaptive Privacy-Preserving Framework for Federated-Learning-Based Android Malware Classification System.
Proceedings of the Knowledge Science, Engineering and Management, 2023
2022
IEEE Trans. Mob. Comput., 2022
IEEE Trans. Intell. Transp. Syst., 2022
FedHGCDroid: An Adaptive Multi-Dimensional Federated Learning for Privacy-Preserving Android Malware Classification.
Entropy, 2022
Proceedings of the IEEE Smartworld, 2022
2021
HNN: A Novel Model to Study the Intrusion Detection Based on Multi-Feature Correlation and Temporal-Spatial Analysis.
IEEE Trans. Netw. Sci. Eng., 2021
IEEE Access, 2021
2020
A Cognitive Method for Automatically Retrieving Complex Information on a Large Scale.
Sensors, 2020
A behavior-aware SLA-based framework for guaranteeing the security conformance of cloud service.
Frontiers Comput. Sci., 2020
IEEE Access, 2020
GHSCN: A Graph Neural Network-Based API Popularity Prediction Method in Service Ecosystem.
IEEE Access, 2020
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020
H2P: A Novel Model to Study the Propagation of Modern Hybrid Worm in Hierarchical Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020
Proceedings of the BDE 2020: 2nd International Conference on Big Data Engineering, 2020
2019
SADI: A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks.
IEEE Trans. Dependable Secur. Comput., 2019
EURASIP J. Wirel. Commun. Netw., 2019
IEEE Access, 2019
An Information Source Identification Algorithm Based on Shortest Arborescence of Network.
Proceedings of the 8th International Conference on Software and Computer Applications, 2019
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
Proceedings of the 5th IEEE International Conference on Big Data Security on Cloud, 2019
2018
Int. J. Embed. Syst., 2018
Coordinated scan detection algorithm based on the global characteristics of time sequence.
Int. J. Comput. Sci. Eng., 2018
Self-healing group key distribution protocol in wireless sensor networks for secure IoT communications.
Future Gener. Comput. Syst., 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2018
Proceedings of the 2018 International Conference on Algorithms, 2018
2017
The Spatial-Temporal Perspective: The Study of the Propagation of Modern Social Worms.
IEEE Trans. Inf. Forensics Secur., 2017
Frontiers Comput. Sci., 2017
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
Proceedings of the 12th Chinese Conference on Computer Supported Cooperative Work and Social Computing, 2017
CloudSec: A Novel Approach to Verifying Security Conformance at the Bottom of the Cloud.
Proceedings of the 2017 IEEE International Congress on Big Data, 2017
2015
Modeling, conflict detection, and verification of a new virtualization role-based access control framework.
Secur. Commun. Networks, 2015
KSII Trans. Internet Inf. Syst., 2015
The Temporal Characteristic of Human Mobility: Modeling and Analysis of Social Worm Propagation.
IEEE Commun. Lett., 2015
Proceedings of the Computational Intelligence and Intelligent Systems, 2015
2014
An Approach for Description of Computer Network Defense Scheme and Its Simulation Verification.
J. Comput., 2014
Proceedings of the Trusted Systems - 6th International Conference, 2014
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014
Coordinated Scan Detection Algorithm Based on the Global Characteristics of Time Sequence.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014
Proceedings of the 2014 Ninth International Conference on P2P, 2014
2013
Proceedings of the Frontiers in Internet Technologies, 2013
Proceedings of the Frontiers in Internet Technologies, 2013
VRBAC: An Extended RBAC Model for Virtualized Environment and Its Conflict Checking Approach.
Proceedings of the Frontiers in Internet Technologies, 2013
Proceedings of the Frontiers in Internet Technologies, 2013
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013
Proceedings of the 2013 International Conference on Cloud and Service Computing, 2013
2012
Semantic Similarity Analysis between High-Level Model Description Text and Low-Level Implementation Text for Network Survivability.
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Web Intelligence, 2012
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012
2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
2010
A Tactical Intelligence Production Model of Computer Network Self-Organizing Operations.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, 2010
Proceedings of the Advanced Intelligent Computing Theories and Applications, 2010
2009
Proceedings of the Web Information Systems and Mining, International Conference, 2009
Proceedings of the Web Information Systems and Mining, International Conference, 2009
2008
J. Softw. Eng. Appl., 2008
A New Type of Self-Adaptive Mechanism for Network Survivability Based on Intrusion Deception.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008
A Game Theoretical Attack-Defense Model Oriented to Network Security Risk Assessment.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008
A Game Theoretical Attack-Defense Model Oriented to Network Security Risk Assessment.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008
2007
Frontiers Comput. Sci. China, 2007
Proceedings of the Future Generation Communication and Networking, 2007
2006
J. Comput. Res. Dev., 2006