default search action
Changzhen Hu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j51]Jiaqi Chen, Shuhang Han, Donghai Tian, Changzhen Hu:
IMUNE: A novel evolutionary algorithm for influence maximization in UAV networks. J. Netw. Comput. Appl. 233: 104038 (2025) - 2024
- [j50]Qiyuan Li, Yumeng Wang, Donghai Tian, Chong Yuan, Changzhen Hu:
Component-based modeling of cascading failure propagation in directed dual-weight software networks. Comput. Networks 255: 110861 (2024) - [j49]Hui Xie, Jun Zheng, Shengjun Wei, Changzhen Hu:
Blockchain-and-6G-based Ubiquitous UAV Task Security Management Architecture. Comput. Commun. 217: 259-267 (2024) - [j48]Hui Xie, Jun Zheng, Zhengyuan Zhang, Shengjun Wei, Changzhen Hu:
TEDA: a trusted execution environment-and-blockchain-based data protection architecture for Internet of Things. Computing 106(3): 939-960 (2024) - [j47]Jiangang Hou, Xin Li, Hongji Xu, Chun Wang, Lizhen Cui, Zhi Liu, Changzhen Hu:
Packet header-based reweight-long short term memory (Rew-LSTM) method for encrypted network traffic classification. Computing 106(8): 2875-2896 (2024) - [j46]Qiyuan Li, Bo Zhang, Donghai Tian, Xiaoqi Jia, Changzhen Hu:
MDGraph: A novel malware detection method based on memory dump and graph neural network. Expert Syst. Appl. 255: 124776 (2024) - [j45]Changzhen Hu, Sanbo Ding:
A Novel Dynamic Event-Triggered Dissipative Filtering for T-S Fuzzy Systems with Asynchronous Constraints. Int. J. Fuzzy Syst. 26(7): 2407-2418 (2024) - [j44]Hui Xie, Jun Zheng, Teng He, Shengjun Wei, Changzhen Hu:
A blockchain-based ubiquitous entity authentication and management scheme with homomorphic encryption for FANET. Peer Peer Netw. Appl. 17(2): 569-584 (2024) - [j43]Changzhen Hu, Sanbo Ding, Xiangpeng Xie:
Event-Based Distributed Set-Membership Estimation for Complex Networks Under Deception Attacks. IEEE Trans Autom. Sci. Eng. 21(3): 3719-3729 (2024) - [j42]Kewei Wang, Changzhen Hu, Chun Shan:
Evaluation of Application Layer DDoS Attack Effect in Cloud Native Applications. IEEE Trans. Cloud Comput. 12(2): 522-538 (2024) - [j41]Changzhen Hu, Sanbo Ding, Yan-Hui Jing, Xiangpeng Xie:
Event-Based Distributed Set-Membership Estimation for Complex Networks: A Coding-Decoding Method. IEEE Trans. Netw. Sci. Eng. 11(2): 1619-1630 (2024) - 2023
- [j40]Hui Xie, Jun Zheng, Teng He, Shengjun Wei, Changzhen Hu:
TEBDS: A Trusted Execution Environment-and-Blockchain-supported IoT data sharing system. Future Gener. Comput. Syst. 140: 321-330 (2023) - [j39]Hui Xie, Jun Zheng, Teng He, Shengjun Wei, Chun Shan, Changzhen Hu:
B-UAVM: A Blockchain-Supported Secure Multi-UAV Task Management Scheme. IEEE Internet Things J. 10(24): 21240-21253 (2023) - [j38]Zhen Liu, Changzhen Hu, Chun Shan, Zheheng Peng:
DEFIA: Evaluate defense effectiveness by fusing behavior information of cyberattacks. Inf. Sci. 646: 119375 (2023) - [j37]Zhen Liu, Changzhen Hu, Chun Shan, Zheng Yan:
ADCaDeM: A Novel Method of Calculating Attack Damage Based on Differential Manifolds. IEEE Trans. Dependable Secur. Comput. 20(5): 4070-4084 (2023) - 2022
- [j36]Kewei Wang, Changzhen Hu, Chun Shan:
Calculation of utility of network services based on state manifolds. Comput. Networks 217: 109258 (2022) - [j35]Donghai Tian, Runze Zhao, Rui Ma, Xiaoqi Jia, Qi Shen, Changzhen Hu, Wenmao Liu:
MDCD: A malware detection approach in cloud using deep learning. Trans. Emerg. Telecommun. Technol. 33(11) (2022) - [j34]Qianjin Ying, Yulei Yu, Donghai Tian, Xiaoqi Jia, Rui Ma, Changzhen Hu:
CJSpector: A Novel Cryptojacking Detection Method Using Hardware Trace and Deep Learning. J. Grid Comput. 20(3): 31 (2022) - [j33]Xianwei Gao, Changzhen Hu, Chun Shan, Weijie Han:
MaliCage: A packed malware family classification framework based on DNN and GAN. J. Inf. Secur. Appl. 68: 103267 (2022) - [j32]Donghai Tian, Qiang Zeng, Dinghao Wu, Peng Liu, Changzhen Hu:
Semi-Synchronized Non-Blocking Concurrent Kernel Cruising. IEEE Trans. Cloud Comput. 10(2): 1428-1444 (2022) - 2021
- [j31]Donghai Tian, Qianjin Ying, Xiaoqi Jia, Rui Ma, Changzhen Hu, Wenmao Liu:
MDCHD: A novel malware detection method in cloud using hardware trace and deep learning. Comput. Networks 198: 108394 (2021) - [j30]Hui Xie, Zhengyuan Zhang, Qi Zhang, Shengjun Wei, Changzhen Hu:
HBRSS: Providing high-secure data communication and manipulation in insecure cloud environments. Comput. Commun. 174: 1-12 (2021) - [j29]Zhen Liu, Changzhen Hu, Chun Shan:
Riemannian manifold on stream data: Fourier transform and entropy-based DDoS attacks detection method. Comput. Secur. 109: 102392 (2021) - [j28]Xiajing Wang, Changzhen Hu, Rui Ma, Donghai Tian, Jinyuan He:
CMFuzz: context-aware adaptive mutation for fuzzers. Empir. Softw. Eng. 26(1): 10 (2021) - [j27]Donghai Tian, Xiaoqi Jia, Rui Ma, Shuke Liu, Wenjing Liu, Changzhen Hu:
BinDeep: A deep learning approach to binary code similarity detection. Expert Syst. Appl. 168: 114348 (2021) - 2020
- [j26]Xianwei Gao, Changzhen Hu, Chun Shan, Baoxu Liu, Zequn Niu, Hui Xie:
Malware classification for the cloud via semi-supervised transfer learning. J. Inf. Secur. Appl. 55: 102661 (2020) - [c42]Xiajing Wang, Changzhen Hu, Rui Ma, Binbin Li, Xuefei Wang:
LAFuzz: Neural Network for Efficient Fuzzing. ICTAI 2020: 603-611
2010 – 2019
- 2019
- [j25]Xianwei Gao, Chun Shan, Changzhen Hu, Zequn Niu, Zhen Liu:
An Adaptive Ensemble Machine Learning Model for Intrusion Detection. IEEE Access 7: 82512-82521 (2019) - [j24]Donghai Tian, Rui Ma, Xiaoqi Jia, Changzhen Hu:
A Kernel Rootkit Detection Approach Based on Virtualization and Machine Learning. IEEE Access 7: 91657-91666 (2019) - [j23]Jingjing Hu, Dongyan Ma, Chen Liu, Zhiyu Shi, Huaizhi Yan, Changzhen Hu:
Network Security Situation Prediction Based on MR-SVM. IEEE Access 7: 130937-130945 (2019) - [j22]Bing Zhang, Huihui Ren, Guoyan Huang, Yongqiang Cheng, Changzhen Hu:
Predicting blood pressure from physiological index data using the SVR algorithm. BMC Bioinform. 20(1): 109:1-109:15 (2019) - [j21]Chun Shan, Shanshan Mei, Changzhen Hu, Liyuan Liu, Limin Mao:
Software structure characteristic measurement method based on weighted network. Comput. Networks 152: 178-185 (2019) - [j20]Donghai Tian, Xiaoqi Jia, Zhaolong Zhang, Li Zhan, Changzhen Hu, Jingfeng Xue:
An online approach to defeating ROP attacks∗. Concurr. Comput. Pract. Exp. 31(22) (2019) - [j19]Donghai Tian, Rui Ma, Xiaoqi Jia, Changzhen Hu:
KEcruiser: A novel control flow protection for kernel extensions. Future Gener. Comput. Syst. 100: 1-9 (2019) - [j18]Kun Lv, Yun Chen, Changzhen Hu:
Dynamic defense strategy against advanced persistent threat under heterogeneous networks. Inf. Fusion 49: 216-226 (2019) - [j17]Hua Wei, Changzhen Hu, Shiyou Chen, Yuan Xue, Quanxin Zhang:
Establishing a software defect prediction model via effective dimension reduction. Inf. Sci. 477: 399-409 (2019) - [j16]Yun Chen, Hui Xie, Kun Lv, Shengjun Wei, Changzhen Hu:
DEPLEST: A blockchain-based privacy-preserving distributed database toward user behaviors in social networks. Inf. Sci. 501: 100-117 (2019) - [c41]Jingjing Hu, Dongyan Ma, Chen Liu, Huaizhi Yan, Changzhen Hu:
An Improved Prediction Model for the Network Security Situation. SmartCom 2019: 22-33 - [c40]Rui Ma, Haoran Gao, Bowen Dou, Xiajing Wang, Changzhen Hu:
Segmental Symbolic Execution Based on Clustering. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1289-1296 - [c39]Ling Xiong, Chun Shan, Changzhen Hu, Zijun Yun, Wenjie Xiong:
A Vulnerability Detection Model for Java Systems Based on Complex Networks. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1339-1347 - 2018
- [j15]Bing Zhang, Guoyan Huang, Zhangqi Zheng, Jiadong Ren, Changzhen Hu:
Approach to Mine the Modularity of Software Network Based on the Most Vital Nodes. IEEE Access 6: 32543-32553 (2018) - [j14]Yun Chen, Kun Lv, Changzhen Hu:
A Dynamic Hidden Forwarding Path Planning Method Based on Improved Q-Learning in SDN Environments. Secur. Commun. Networks 2018: 2058429:1-2058429:12 (2018) - [j13]Qian Wang, Jiadong Ren, Xiaoli Yang, Yongqiang Cheng, Darryl N. Davis, Changzhen Hu:
Security Feature Measurement for Frequent Dynamic Execution Paths in Software System. Secur. Commun. Networks 2018: 5716878:1-5716878:10 (2018) - [j12]Donghai Tian, Xi Xiong, Changzhen Hu, Peng Liu:
A policy-centric approach to protecting OS kernel from vulnerable LKMs. Softw. Pract. Exp. 48(6): 1269-1284 (2018) - [c38]Chong Sun, Kun Lv, Changzhen Hu, Hui Xie:
A Double-Layer Detection and Classification Approach for Network Attacks. ICCCN 2018: 1-8 - [c37]Hui Xie, Kun Lv, Changzhen Hu, Chong Sun:
A Monte Carlo Graph Search Algorithm with Ant Colony Optimization for Optimal Attack Path Analysis. ICCCN 2018: 1-8 - [c36]Hui Xie, Kun Lv, Changzhen Hu:
A Partition Matching Method for Optimal Attack Path Analysis. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 120-126 - [c35]Ningyuan Cao, Kun Lv, Changzhen Hu:
An Attack Graph Generation Method Based on Parallel Computing. SciSec 2018: 34-48 - [c34]Zhengyuan Zhang, Kun Lv, Changzhen Hu:
Establishing an Optimal Network Defense System: A Monte Carlo Graph Search Method. SciSec 2018: 181-190 - [c33]Hui Xie, Kun Lv, Changzhen Hu:
An Improved Monte Carlo Graph Search Algorithm for Optimal Attack Path Analysis. TrustCom/BigDataSE 2018: 307-315 - [c32]Zijun Yu, Chun Shan, Limin Mao, Changzhen Hu, Wenjie Xiong:
Software System Representation Methods Based on Algebraic Component. TrustCom/BigDataSE 2018: 1008-1013 - [c31]Huihui Xie, Kun Lv, Changzhen Hu:
An Effective Method to Generate Simulated Attack Data Based on Generative Adversarial Nets. TrustCom/BigDataSE 2018: 1777-1784 - 2017
- [j11]Donghai Tian, Xiaoqi Jia, Junhua Chen, Changzhen Hu:
An Online Approach for Kernel-level Keylogger Detection and Defense. J. Inf. Sci. Eng. 33(2): 445-461 (2017) - [c30]Wenzhe Liao, Qian Wang, Luqun Yang, Jiadong Ren, Darryl N. Davis, Changzhen Hu:
Mining Frequent Intra-Sequence and Inter-Sequence Patterns Using Bitmap with a Maximal Span. WISA 2017: 56-61 - [c29]Wenzhe Liao, Qian Wang, Yu Wang, Jiadong Ren, Yongqiang Cheng, Changzhen Hu:
Mining Frequent Patterns for Item-Oriented and Customer-Oriented Analysis. WISA 2017: 62-67 - [c28]Donghai Tian, Xiaoqi Jia, Li Zhan, Changzhen Hu, Jingfeng Xue:
An Online Approach to Defeating Return-Oriented-Programming Attacks. CSS 2017: 236-247 - [c27]Shengjun Wei, Xiaojiang Du, Changzhen Hu, Chun Shan:
Predicting Vulnerable Software Components Using Software Network Graph. CSS 2017: 280-290 - [c26]Shichao Lv, Liang Xiao, Qing Hu, Xiaoshan Wang, Changzhen Hu, Limin Sun:
Anti-Jamming Power Control Game in Unmanned Aerial Vehicle Networks. GLOBECOM 2017: 1-6 - [c25]Donghai Tian, Dingjun Qi, Li Zhan, Yuhang Yin, Changzhen Hu, Jingfeng Xue:
A Practical Method to Confine Sensitive API Invocations on Commodity Hardware. NSS 2017: 145-159 - [c24]Yukun Zheng, Kun Lv, Changzhen Hu:
A Quantitative Method for Evaluating Network Security Based on Attack Graph. NSS 2017: 349-358 - [c23]Rui Ma, Tianbao Zhu, Changzhen Hu, Chun Shan, Xiaolin Zhao:
SulleyEX: A Fuzzer for Stateful Network Protocol. NSS 2017: 359-372 - [c22]Chun Shan, Shiyou Sun, Jingfeng Xue, Changzhen Hu, Hongjin Zhu:
A Detecting Method of Array Bounds Defects Based on Symbolic Execution. NSS 2017: 373-385 - [c21]Yun Chen, Kun Lv, Changzhen Hu:
Optimal Attack Path Generation Based on Supervised Kohonen Neural Network. NSS 2017: 399-412 - [c20]Rui Ma, Siyu Chen, Ke Ma, Changzhen Hu, Xiajing Wang:
Defenses Against Wormhole Attacks in Wireless Sensor Networks. NSS 2017: 413-426 - [c19]Hao Zhang, Kun Lv, Changzhen Hu:
An Automatic Vulnerabilities Classification Method Based on Their Relevance. NSS 2017: 475-485 - [c18]Qiong Xiao, Changzhen Hu, Gangyi Ding:
A Driver Model Based on Emotion. ICSI (2) 2017: 608-614 - 2016
- [j10]Chun Shan, Zequn Yu, Changzhen Hu, Jingfeng Xue, Luxia Wu:
Optimization of program recursive function calls analysis method. Autom. Control. Comput. Sci. 50(4): 253-259 (2016) - [j9]Donghai Tian, Junhua Chen, Changzhen Hu, Jingfeng Xue:
A Secure and Efficient Kernel Log Transfer Mechanism for Virtualization Environments. J. Inf. Sci. Eng. 32(5): 1131-1143 (2016) - 2015
- [j8]Rui Ma, Qiang Guo, Changzhen Hu, Jingfeng Xue:
An Improved WiFi Indoor Positioning Algorithm by Weighted Fusion. Sensors 15(9): 21824-21843 (2015) - [c17]Yong Wang, Ming Li, Hailin Yan, Zhenyan Liu, Jingfeng Xue, Changzhen Hu:
Dynamic Binary Instrumentation Based Defense Solution against Virtual Function Table Hijacking Attacks at C++ Binary Programs. 3PGCIC 2015: 430-434 - [c16]Jiani Li, Donghai Tian, Changzhen Hu:
Dynamic Tracking Reinforcement Based on Simplified Control Flow. CIS 2015: 358-362 - 2014
- [j7]Donghai Tian, Xi Xiong, Changzhen Hu, Peng Liu:
Defeating buffer overflow attacks via virtualization. Comput. Electr. Eng. 40(6): 1940-1950 (2014) - [j6]Donghai Tian, Xuanya Li, Mo Chen, Changzhen Hu:
iCruiser: An Improved Approach for Concurrent Heap Buffer Overflow Monitoring. IEICE Trans. Inf. Syst. 97-D(3): 601-605 (2014) - [j5]Donghai Tian, Jingfeng Xue, Changzhen Hu, Xuanya Li:
A Virtualization-Based Approach for Application Whitelisting. IEICE Trans. Inf. Syst. 97-D(6): 1648-1651 (2014) - [j4]Hao Bai, Changzhen Hu, Xiao-chuan Jing, Ning Li, Xiaoyin Wang:
Approach for malware identification using dynamic behaviour and outcome triggering. IET Inf. Secur. 8(2): 140-151 (2014) - [c15]Jingfeng Xue, Yan Zhang, Changzhen Hu, Hongyu Ren, Zhiqiang Li:
Software Behavior Model Measuring Approach of Combining Structural Analysis and Language Set. INTRUST 2014: 137-150 - 2013
- [j3]Donghai Tian, Mo Chen, Changzhen Hu, Xuanya Li:
Efficient Shellcode Detection on Commodity Hardware. IEICE Trans. Inf. Syst. 96-D(10): 2272-2276 (2013) - [c14]Rui Ma, Lingkui Chen, Changzhen Hu, Jingfeng Xue, Xiaolin Zhao:
A Dynamic Detection Method to C/C++ Programs Memory Vulnerabilities Based on Pointer Analysis. DASC 2013: 52-57 - 2012
- [c13]Donghai Tian, Qiang Zeng, Dinghao Wu, Peng Liu, Changzhen Hu:
Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring. NDSS 2012 - 2011
- [j2]Hao Bai, Kunsheng Wang, Changzhen Hu, Gang Zhang, Xiao-chuan Jing:
Boosting performance in attack intention recognition by integrating multiple techniques. Frontiers Comput. Sci. China 5(1): 109-118 (2011) - [c12]Donghai Tian, Xi Xiong, Changzhen Hu, Peng Liu:
Policy-Centric Protection of OS Kernel from Vulnerable Loadable Kernel Modules. ISPEC 2011: 317-332 - [c11]Jingfeng Xue, Changzhen Hu, Hongyu Ren, Rui Ma, Jian Li:
Memory errors prevention technology for C/C++ program based on probability. NLPKE 2011: 233-237 - 2010
- [j1]Hao Bai, Changzhen Hu, Gang Zhang, Xiao-chuan Jing, Ning Li:
Binary Oriented Vulnerability Analyzer Based on Hidden Markov Model. IEICE Trans. Inf. Syst. 93-D(12): 3410-3413 (2010) - [c10]Donghai Tian, Xi Xiong, Changzhen Hu, Peng Liu:
Integrating Offline Analysis and Online Protection to Defeat Buffer Overflow Attacks. ISC 2010: 409-415 - [c9]Donghai Tian, Deguang Kong, Changzhen Hu, Peng Liu:
Protecting Kernel Data through Virtualization Technology. SECURWARE 2010: 5-10 - [c8]Guibin Hou, Ruixia Yao, Jiadong Ren, Changzhen Hu:
A Clustering Algorithm Based on Matrix over High Dimensional Data Stream. WISM 2010: 86-94
2000 – 2009
- 2009
- [c7]Donghai Tian, Changzhen Hu, Yang Qi, Jianqiao Wang:
Hierarchical Distributed Alert Correlation Model. IAS 2009: 765-768 - [c6]Jiadong Ren, Changzhen Hu, Kunsheng Wang, Di Wu:
A Method for Analyzing Software Faults Based on Mining Outliers' Feature Attribute Sets. AMT 2009: 409-417 - [c5]Haitao He, Yanpeng Zhang, Jiadong Ren, Changzhen Hu:
An Improved OLAP Join and Aggregate Algorithm Based on Dimension Hierarchy. FSKD (5) 2009: 169-172 - [c4]Jiadong Ren, Qunhui Wu, Jia Zhang, Changzhen Hu:
Efficient Outlier Detection Algorithm for Heterogeneous Data Streams. FSKD (5) 2009: 259-264 - [c3]Jingfeng Xue, Changzhen Hu, Kunsheng Wang, Rui Ma, Jiaxin Zou:
Metamorphic malware detection technology based on aggregating emerging patterns. ICIS 2009: 1293-1296 - [c2]Yinzhao Li, Dongxu Yang, Jiadong Ren, Changzhen Hu:
An Approach for Database Intrusion Detection Based on the Event Sequence Clustering. NCM 2009: 584-588 - [c1]Jiadong Ren, Changzhen Hu, Kunsheng Wang, Dongmei Zhang:
Software Fault Feature Clustering Algorithm Based on Sequence Pattern. WISM 2009: 439-447
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint