Hongsong Chen
Orcid: 0000-0002-8159-4984
According to our database1,
Hongsong Chen
authored at least 37 papers
between 2003 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Federated learning incentivize with privacy-preserving for IoT in edge computing in the context of B5G.
Clust. Comput., April, 2025
2024
Stochastic Evolutionary Game Model of Hot Topics Propagation for Network Public Opinion.
IEEE Trans. Comput. Soc. Syst., December, 2024
Comprehensive framework for implementing blockchain-enabled federated learning and full homomorphic encryption for chatbot security system.
Clust. Comput., November, 2024
Blockchain-as-a-Service for the Security Challenges and Solutions in the Internet of Things Environment.
Wirel. Pers. Commun., June, 2024
Multivariate time series anomaly detection by fusion of deep convolution residual autoencoding reconstruction model and ConvLstm forecasting model.
Comput. Secur., February, 2024
2023
J. Ambient Intell. Humaniz. Comput., December, 2023
Security Issues and Solutions in Federate Learning Under IoT Critical Infrastructure.
Wirel. Pers. Commun., March, 2023
Proceedings of the Fuzzy Systems and Data Mining IX, 2023
2021
Security Threats and Defensive Approaches in Machine Learning System Under Big Data Environment.
Wirel. Pers. Commun., 2021
DDoS Attack Simulation and Machine Learning-Based Detection Approach in Internet of Things Experimental Environment.
Int. J. Inf. Secur. Priv., 2021
2020
Novel LDoS attack detection by Spark-assisted correlation analysis approach in wireless sensor network.
IET Inf. Secur., 2020
Modeling and detection of the multi-stages of Advanced Persistent Threats attacks based on semi-supervised learning and complex networks characteristics.
Future Gener. Comput. Syst., 2020
2019
Using Improved Hilbert-Huang Transformation Method to Detect Routing-Layer Reduce of Quality Attack in Wireless Sensor Network.
Wirel. Pers. Commun., 2019
国家电网边缘计算信息系统安全风险评估方法研究 (Research on Security Risk Assessment Method of State Grid Edge Computing Information System).
计算机科学, 2019
Recent Advances in Cryptovirology: State-of-the-Art Crypto Mining and Crypto Ransomware Attacks.
KSII Trans. Internet Inf. Syst., 2019
A novel HHT and KS statistic approach to detect RoQ attack in wireless sensor network.
Int. J. Embed. Syst., 2019
Future Gener. Comput. Syst., 2019
A novel SMP-based survivability evaluation metric and approach in wireless sensor network.
Comput. Sci. Inf. Syst., 2019
A Novel Low-Rate Denial of Service Attack Detection Approach in ZigBee Wireless Sensor Network by Combining Hilbert-Huang Transformation and Trust Evaluation.
IEEE Access, 2019
2018
TCSTM: A task-characteristic-considered steady-state thermal model of multicore processors.
Microprocess. Microsystems, 2018
Int. J. Netw. Secur., 2018
Multi-stage crypto ransomware attacks: A new emerging cyber threat to critical infrastructure and industrial control systems.
ICT Express, 2018
2017
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017
2016
基于分段模型检测的云服务跨域认证协议的形式化分析与验证 (Cloud Services Cross-domain Authentication Protocol Formal Analysis and Verification Based on Fragment Model Check).
计算机科学, 2016
2015
Hadoop-Based Healthcare Information System Design and Wireless Security Communication Implementation.
Mob. Inf. Syst., 2015
Design and Implementation of Cloud Server Remote Management System Based on IMPI Protocol.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015
Quantitative Trustworthy Evaluation Scheme for Trust Routing Scheme in Wireless Sensor Networks.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
2014
IEEE Cloud Comput., 2014
2013
Networks, Crowds, and Markets: Reasoning about a Highly Connected World [Book Review].
IEEE Technol. Soc. Mag., 2013
2011
A Novel Trust Routing Scheme Based on Node Behaviour Evaluation for Mobile AD Hoc Networks.
Intell. Autom. Soft Comput., 2011
2010
Proceedings of the Global Communications Conference, 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2007
Using Network Processor to Establish Trustworthy Agent Scheme for AODV Routing Protocol.
Wirel. Pers. Commun., 2007
Design and performance evaluation of a multi-agent-based dynamic lifetime security scheme for AODV routing protocol.
J. Netw. Comput. Appl., 2007
J. Comput. Inf. Technol., 2007
2003
Proceedings of the Advanced Parallel Programming Technologies, 5th International Workshop, 2003