Chunjie Cao
Orcid: 0000-0001-9439-8256
According to our database1,
Chunjie Cao
authored at least 48 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2008
2010
2012
2014
2016
2018
2020
2022
2024
0
5
10
15
1
2
4
1
4
1
3
1
1
4
9
5
2
4
4
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
FACILE: A capsule network with fewer capsules and richer hierarchical information for malware image classification.
Comput. Secur., February, 2024
A Weighted Discrete Wavelet Transform-Based Capsule Network for Malware Classification.
Proceedings of the Pattern Recognition - 27th International Conference, 2024
2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Radiofrequency Fingerprint Feature Extraction and Recognition Using a Coordinate Attention-Guided Deep Residual Shrinkage Network.
Proceedings of the International Conference on Networking and Network Applications, 2023
LGWAE: Label-Guided Weighted Autoencoder Network for Flexible Targeted Attacks of Deep Hashing.
Proceedings of the International Joint Conference on Neural Networks, 2023
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023
2022
J. Inf. Secur. Appl., 2022
Mul-GAD: a semi-supervised graph anomaly detection framework via aggregating multi-view information.
CoRR, 2022
A Short Signal Backoff MAC Protocol Based on Game Theory for Underwater Sensor Networks.
IEEE Access, 2022
Proceedings of the IEEE Smartworld, 2022
DRSN with Simple Parameter-Free Attention Module for Specific Emitter Identification.
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the Security and Privacy in Social Networks and Big Data, 2022
Proceedings of the Security and Privacy in Social Networks and Big Data, 2022
Blind Identification of Channel Codes under AWGN and Fading Conditions via Deep Learning.
Proceedings of the International Conference on Networking and Network Applications, 2022
Feature Extraction and Identification of Specific Radiation Sources Based on Axial Integral Bispectrum and Deep Residual Shrinkage Network.
Proceedings of the International Conference on Networking and Network Applications, 2022
Hierarchical Attention Network for Interpretable and Fine-Grained Vulnerability Detection.
Proceedings of the IEEE INFOCOM 2022, 2022
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022
Vulnerability Dataset Construction Methods Applied To Vulnerability Detection: A Survey.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
2021
Proceedings of the Artificial Intelligence and Security - 7th International Conference, 2021
RF Transmitter Identification and Classification Based on Deep Residual Shrinkage Network.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021
2020
A secure data deletion scheme for IoT devices through key derivation encryption and data analysis.
Future Gener. Comput. Syst., 2020
Proceedings of the Cyberspace Safety and Security - 12th International Symposium, 2020
Proceedings of the Cyberspace Safety and Security - 12th International Symposium, 2020
2019
Block rank sparsity-aware DOA estimation with large-scale arrays in the presence of unknown mutual coupling.
Digit. Signal Process., 2019
CoRR, 2019
Modeling Data, Information and Knowledge for Security Protection of Hybrid IoT and Edge Resources.
IEEE Access, 2019
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019
Proceedings of the Data Processing Techniques and Applications for Cyber-Physical Systems, 2019
A Blind Watermarking Scheme Using Adaptive Neuro-Fuzzy Inference System Optimized by BP Network and LS Learning Model.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
2018
Tensor-Based Angle Estimation Approach for Strictly Noncircular Sources with Unknown Mutual Coupling in Bistatic MIMO Radar.
Sensors, 2018
Robust DOA Estimation for MIMO Radar in Unknown Nonuniform Noise and Mutual Coupling.
Proceedings of the 10th IEEE Sensor Array and Multichannel Signal Processing Workshop, 2018
Proceedings of the 23rd IEEE International Conference on Digital Signal Processing, 2018
A Secure Blind Watermarking Scheme Based on Dual Frequency Domains and Ergodic Matrix.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Searchable Encryption Scheme Based on CPABE with Attribute Update in a Cloud Medical Environment.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
2017
J. Electr. Comput. Eng., 2017
J. Electr. Comput. Eng., 2017
Proceedings of the Communications, Signal Processing, and Systems, 2017
2014
Proceedings of the Network and System Security - 8th International Conference, 2014
2009
Proceedings of the Guide to Wireless Mesh Networks, 2009
2008
Constructing UC Secure and Constant-Round Group Key Exchange Protocols via Secret Sharing.
EURASIP J. Wirel. Commun. Netw., 2008