Kangfeng Zheng
Orcid: 0000-0002-1160-5596
According to our database1,
Kangfeng Zheng
authored at least 76 papers
between 2007 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
ERAT-DLoRA: Parameter-efficient tuning with enhanced range adaptation in time and depth aware dynamic LoRA.
Neurocomputing, 2025
2024
FedKG: A Knowledge Distillation-Based Federated Graph Method for Social Bot Detection.
Sensors, June, 2024
Neural Networks, 2024
Knowl. Based Syst., 2024
2023
Multim. Syst., April, 2023
Comparative Analysis of ASV Spoofing Countermeasures: Evaluating Res2Net-Based Approaches.
IEEE Signal Process. Lett., 2023
Comput. Syst. Sci. Eng., 2023
2022
User Authentication Method Based on Keystroke Dynamics and Mouse Dynamics with Scene-Irrelated Features in Hybrid Scenes.
Sensors, 2022
A Hybrid PSO-BPSO Based Kernel Extreme Learning Machine Model for Intrusion Detection.
J. Inf. Process. Syst., 2022
Comput. Intell. Neurosci., 2022
Moving Target Defense Strategy Selection Method Based on Long-term Traffic Prediction.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022
2021
IEEE Trans. Syst. Man Cybern. Syst., 2021
Phishing Website Detection Based on Deep Convolutional Neural Network and Random Forest Ensemble Learning.
Sensors, 2021
Image Vis. Comput., 2021
Int. J. Pattern Recognit. Artif. Intell., 2021
Proceedings of the DSIT 2021: 4th International Conference on Data Science and Information Technology, Shanghai, China, July 23, 2021
CENTIME: A Direct Comprehensive Traffic Features Extraction for Encrypted Traffic Classification.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021
2020
Graph Adaptation Network with Domain-Specific Word Alignment for Cross-Domain Relation Extraction.
Sensors, 2020
User Authentication Method Based on MKL for Keystroke and Mouse Behavioral Feature Fusion.
Secur. Commun. Networks, 2020
IEEE Netw., 2020
A Nature-inspired Multiple Kernel Extreme Learning Machine Model for Intrusion Detection.
KSII Trans. Internet Inf. Syst., 2020
Detection of compromised accounts for online social networks based on a supervised analytical hierarchy process.
IET Inf. Secur., 2020
Feature subset selection combining maximal information entropy and maximal information coefficient.
Appl. Intell., 2020
Network Intrusion Detection Based on Supervised Adversarial Variational Auto-Encoder With Regularization.
IEEE Access, 2020
Using Improved Conditional Generative Adversarial Networks to Detect Social Bots on Twitter.
IEEE Access, 2020
IEEE Access, 2020
2019
Improving the Classification Effectiveness of Intrusion Detection by Using Improved Conditional Variational AutoEncoder and Deep Neural Network.
Sensors, 2019
Group-Based Susceptible-Infectious-Susceptible Model in Large-Scale Directed Networks.
Secur. Commun. Networks, 2019
Secur. Commun. Networks, 2019
KSII Trans. Internet Inf. Syst., 2019
KSII Trans. Internet Inf. Syst., 2019
Internet Things, 2019
User identification by keystroke dynamics using improved binary particle swarm optimisation.
Int. J. Bio Inspired Comput., 2019
IEEE Access, 2019
Improving Reliability: User Authentication on Smartphones Using Keystroke Biometrics.
IEEE Access, 2019
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
Feature selection method with joint maximal information entropy between features and class.
Pattern Recognit., 2018
Comput. J., 2018
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the IEEE Globecom Workshops, 2018
2017
Collaborative Authentication in Decentralized Dense Mobile Networks With Key Predistribution.
IEEE Trans. Inf. Forensics Secur., 2017
Scalable Node-Centric Route Mutation for Defense of Large-Scale Software-Defined Networks.
Secur. Commun. Networks, 2017
Secur. Commun. Networks, 2017
Feature Selection to Mine Joint Features from High-dimension Space for Android Malware Detection.
KSII Trans. Internet Inf. Syst., 2017
KSII Trans. Internet Inf. Syst., 2017
Fuzzy-synthetic minority oversampling technique: Oversampling based on fuzzy set theory for Android malware detection in imbalanced datasets.
Int. J. Distributed Sens. Networks, 2017
Proceedings of the 17th International Symposium on Communications and Information Technologies, 2017
Node-centric route mutation for large-scale SDN based on 3D earth mover's distance model.
Proceedings of the 17th International Symposium on Communications and Information Technologies, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
Flow-based Anomaly Detection Using Access Behavior Profiling and Time-sequenced Relation Mining.
KSII Trans. Internet Inf. Syst., 2016
Anti-Pollution Source Location Privacy Preserving Scheme in Wireless Sensor Networks.
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016
Detection of command and control in advanced persistent threat based on independent access.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
2015
KSII Trans. Internet Inf. Syst., 2015
Towards a multiobjective framework for evaluating network security under exploit attacks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015
2014
Int. J. Comput. Intell. Syst., 2014
2012
A Danger Theory Based Mobile Virus Detection Model and Its Application in Inhibiting Virus.
J. Networks, 2012
J. Networks, 2012
A Secure Network Coding-based Data Gathering Model and Its Protocol in Wireless Sensor Networks.
Int. J. Comput. Intell. Syst., 2012
2011
Proceedings of the 2011 IEEE Visual Communications and Image Processing, 2011
A study on energy efficient cluster-based network coding protocol for aggregated-data gathering in wireless sensor networks.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2011
2010
Proceedings of the 2010 International Conference on Machine Vision and Human-machine Interface, 2010
2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
2007
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2007