default search action
Chunhe Xia
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Yang Li, Chunhe Xia, Chunyan Li, Yuan Zhao, Chen Chen, Tianbo Wang:
HL-DPoS: An enhanced anti-long-range attack DPoS algorithm. Comput. Networks 249: 110473 (2024) - [c53]Changnan Jiang, Chunhe Xia, Mengyao Liu, Chen Chen, Huacheng Li, Tianbo Wang, Pengfei Li:
FedDRC: A Robust Federated Learning-based Android Malware Classifier under Heterogeneous Distribution. CSCWD 2024: 1029-1036 - [c52]Huacheng Li, Chunhe Xia, Tianbo Wang, Wanshuang Lin, Changnan Jiang, Chen Chen, Yuan Zhao:
Multi-Signal Fusion of Social Diffusion Graph with Bi-Directional Semantic Consistency. ICASSP 2024: 5450-5454 - [c51]Weidong Huang, Jiaming Ji, Chunhe Xia, Borong Zhang, Yaodong Yang:
SafeDreamer: Safe Reinforcement Learning with World Models. ICLR 2024 - [c50]Changnan Jiang, Chunhe Xia, Mengyao Liu, Rui Fang, Pengfei Li, Huacheng Li, Tianbo Wang:
FedDADP: A Privacy-Risk-Adaptive Differential Privacy Protection Method for Federated Android Malware Classifier. IJCNN 2024: 1-10 - [i7]Yang Li, Chunhe Xia, Wanshuang Lin, Tianbo Wang:
PPBFL: A Privacy Protected Blockchain-based Federated Learning Model. CoRR abs/2401.01204 (2024) - [i6]Yang Li, Chunhe Xia, Dongchi Huang, Xiaojian Li, Tianbo Wang:
BFLN: A Blockchain-based Federated Learning Model for Non-IID Data. CoRR abs/2407.05276 (2024) - 2023
- [j30]Huacheng Li, Chunhe Xia, Tianbo Wang, Sheng Wen, Chao Chen, Yang Xiang:
Capturing Dynamics of Information Diffusion in SNS: A Survey of Methodology and Techniques. ACM Comput. Surv. 55(2): 22:1-22:51 (2023) - [j29]Changnan Jiang, Chunhe Xia, Zhuodong Liu, Tianbo Wang:
FedDroidMeter: A Privacy Risk Evaluator for FL-Based Android Malware Classification Systems. Entropy 25(7): 1053 (2023) - [j28]Tianbo Wang, Huacheng Li, Chunhe Xia, Han Zhang, Pei Zhang:
From the Dialectical Perspective: Modeling and Exploiting of Hybrid Worm Propagation. IEEE Trans. Inf. Forensics Secur. 18: 1610-1624 (2023) - [c49]Changnan Jiang, Chunhe Xia, Zhuodong Liu, Tianbo Wang:
FedDroidADP: An Adaptive Privacy-Preserving Framework for Federated-Learning-Based Android Malware Classification System. KSEM (3) 2023: 184-199 - [c48]Changnan Jiang, Chunhe Xia, Chen Chen, Huacheng Li, Tianbo Wang, Xiaojian Li:
FedDLM: A Fine-Grained Assessment Scheme for Risk of Sensitive Information Leakage in Federated Learning-based Android Malware Classifier. TrustCom 2023: 231-240 - [c47]Wanshuang Lin, Chunhe Xia, Tianbo Wang, Chen Chen, Yuan Zhao, Weidong Zhou:
REDA: Malicious Traffic Detection Based on Record Length and Frequency Domain Analysis. TrustCom 2023: 668-675 - [c46]Chen Chen, Chunhe Xia, Tianbo Wang, Wanshuang Lin, Yuan Zhao, Yang Li:
EFwork: An Efficient Framework for Constructing a Malware Knowledge Graph. TrustCom 2023: 1258-1265 - [c45]Weidong Zhou, Tianbo Wang, Guotao Huang, Xiaopeng Liang, Chunhe Xia, Xiaojian Li:
HF-Mid: A Hybrid Framework of Network Intrusion Detection for Multi-type and Imbalanced Data. TrustCom 2023: 1546-1553 - [i5]Weidong Huang, Jiaming Ji, Borong Zhang, Chunhe Xia, Yaodong Yang:
Safe DreamerV3: Safe Reinforcement Learning with World Models. CoRR abs/2307.07176 (2023) - [i4]Yang Li, Chunhe Xia, Chang Li, Tianbo Wang:
BRFL: A Blockchain-based Byzantine-Robust Federated Learning Model. CoRR abs/2310.13403 (2023) - [i3]Yang Li, Chunhe Xia, Chunyan Li, Yuan Zhao, Chen Chen, Tianbo Wang:
HL-DPoS: An Enhanced Anti-Long-Range Attack DPoS Algorithm. CoRR abs/2310.15460 (2023) - [i2]Yang Li, Chunhe Xia, Wei Liu, Weidong Zhou, Chen Chen, Tianbo Wang:
FBChain: A Blockchain-based Federated Learning Model with Efficiency and Secure Communication. CoRR abs/2312.00035 (2023) - 2022
- [j27]Changnan Jiang, Kanglong Yin, Chunhe Xia, Weidong Huang:
FedHGCDroid: An Adaptive Multi-Dimensional Federated Learning for Privacy-Preserving Android Malware Classification. Entropy 24(7): 919 (2022) - [j26]Long Chen, Jianguo Chen, Chunhe Xia:
Social network behavior and public opinion manipulation. J. Inf. Secur. Appl. 64: 103060 (2022) - [j25]Wenchao Li, Chunhe Xia, Chen Wang, Tianbo Wang:
Secure and Temporary Access Delegation With Equality Test for Cloud-Assisted IoV. IEEE Trans. Intell. Transp. Syst. 23(11): 20187-20201 (2022) - [j24]Tianbo Wang, Chunhe Xia, Xiaojian Li, Yang Xiang:
Epidemic Heterogeneity and Hierarchy: A Study of Wireless Hybrid Worm Propagation. IEEE Trans. Mob. Comput. 21(5): 1639-1656 (2022) - [c44]Huacheng Li, Chunhe Xia, Tianbo Wang, Haopeng Zhao:
CRCS: Learning Synergistic Cascade Correlation for Microscopic Cascade Prediction. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 1152-1159 - 2021
- [j23]Long Chen, Chunhe Xia, Shengwei Lei, Tianbo Wang:
Detection, Traceability, and Propagation of Mobile Malware Threats. IEEE Access 9: 14576-14598 (2021) - [j22]Shengwei Lei, Chunhe Xia, Zhong Li, Xiaojian Li, Tianbo Wang:
HNN: A Novel Model to Study the Intrusion Detection Based on Multi-Feature Correlation and Temporal-Spatial Analysis. IEEE Trans. Netw. Sci. Eng. 8(4): 3257-3274 (2021) - [i1]Huacheng Li, Chunhe Xia, Tianbo Wang, Sheng Wen, Chao Chen, Yang Xiang:
Capturing Dynamics of Information Diffusion in SNS: A Survey of Methodology and Techniques. CoRR abs/2110.14245 (2021) - 2020
- [j21]Zhong Li, Xiaochen Liu, Tianbo Wang, Wenhui He, Chunhe Xia:
GHSCN: A Graph Neural Network-Based API Popularity Prediction Method in Service Ecosystem. IEEE Access 8: 137032-137051 (2020) - [j20]Yongyue Wang, Chunhe Xia, Chengxiang Si, Beitong Yao, Tianbo Wang:
Robust Reasoning Over Heterogeneous Textual Information for Fact Verification. IEEE Access 8: 157140-157150 (2020) - [j19]Xiaochen Liu, Chunhe Xia, Tianbo Wang, Li Zhong, Xiaojian Li:
A behavior-aware SLA-based framework for guaranteeing the security conformance of cloud service. Frontiers Comput. Sci. 14(6): 146808 (2020) - [j18]Yongyue Wang, Beitong Yao, Tianbo Wang, Chunhe Xia, Xianghui Zhao:
A Cognitive Method for Automatically Retrieving Complex Information on a Large Scale. Sensors 20(11): 3057 (2020) - [c43]Jingang Liu, Chunhe Xia, Xiaojian Li, Haihua Yan, Tengteng Liu:
A BERT-based Ensemble Model for Chinese News Topic Prediction. BDE 2020: 18-23 - [c42]Tianbo Wang, Chunhe Xia:
H2P: A Novel Model to Study the Propagation of Modern Hybrid Worm in Hierarchical Networks. ICA3PP (3) 2020: 251-269 - [c41]Jingang Liu, Chunhe Xia, Haihua Yan, Jie Sun:
A Feasible Chinese Text Data Preprocessing Strategy. UEMCON 2020: 234-239
2010 – 2019
- 2019
- [j17]Jingang Liu, Chunhe Xia, Haihua Yan, Zhipu Xie, Jie Sun:
Hierarchical Comprehensive Context Modeling for Chinese Text Classification. IEEE Access 7: 154546-154559 (2019) - [j16]Cheng Zhang, Chunhe Xia, Yu Li, Haiquan Wang, Xiaojian Li:
A hotspot-based probabilistic cache placement policy for ICN in MANETs. EURASIP J. Wirel. Commun. Netw. 2019: 134 (2019) - [j15]Tianbo Wang, Chunhe Xia, Sheng Wen, Hui Xue, Yang Xiang, Shouzhong Tu:
SADI: A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks. IEEE Trans. Dependable Secur. Comput. 16(1): 142-155 (2019) - [c40]Shizhao Wang, Chunhe Xia, Tianbo Wang:
A Novel Intrusion Detector Based on Deep Learning Hybrid Methods. BigDataSecurity/HPSC/IDS 2019: 300-305 - [c39]Zhong Li, Chunhe Xia, Tianbo Wang, Xiaochen Liu:
Which Node Properties Identify the Propagation Source in Networks? ICA3PP (1) 2019: 256-270 - [c38]Shizhao Wang, Chunhe Xia, Tianbo Wang:
Feature Generation: A Novel Intrusion Detection Model Based on Prototypical Network. ICA3PP (1) 2019: 564-577 - [c37]Shengwei Lei, Chunhe Xia, Tianbo Wang, Shizhao Wang:
Topic Reconstruction: A Novel Method Based on LDA Oriented to Intrusion Detection. ICA3PP (1) 2019: 578-594 - [c36]Zhong Li, Chunhe Xia, Tianbo Wang, Xiaochen Liu:
An Information Source Identification Algorithm Based on Shortest Arborescence of Network. ICSCA 2019: 442-446 - 2018
- [j14]Hua Guo, Yandong Zheng, Xiong Li, Zhoujun Li, Chunhe Xia:
Self-healing group key distribution protocol in wireless sensor networks for secure IoT communications. Future Gener. Comput. Syst. 89: 713-721 (2018) - [j13]Yanli Lv, Yuanlong Li, Shuang Xiang, Chunhe Xia:
Coordinated scan detection algorithm based on the global characteristics of time sequence. Int. J. Comput. Sci. Eng. 16(1): 42-52 (2018) - [j12]Yang Bo, Chunhe Xia, Yang Luo, Qing Tang:
Static compliance checking beyond separation of duty constraints. Int. J. Embed. Syst. 10(5): 423-436 (2018) - [c35]Honglin Ren, Zhigang Zhang, Chunhe Xia:
Online Social Spammer Detection Based on Semi-supervised Learning. ACAI 2018: 32:1-32:5 - [c34]Cheng Zhang, Chunhe Xia, Haiquan Wang:
A Probabilistic and Rebalancing Cache Placement Strategy for ICN in MANETs. ChineseCSCW 2018: 228-238 - [c33]Zhangkai Zhang, Zhoujun Li, Chunhe Xia, Jinhua Cui, Jinxin Ma:
H-Securebox: A Hardened Memory Data Protection Framework on ARM Devices. DSC 2018: 325-332 - 2017
- [j11]Yang Bo, Chunhe Xia, Zhigang Zhang, Xinzheng Lu:
On the satisfiability of authorization requirements in business process. Frontiers Comput. Sci. 11(3): 528-540 (2017) - [j10]Tianbo Wang, Chunhe Xia, Zhong Li, Xiaochen Liu, Yang Xiang:
The Spatial-Temporal Perspective: The Study of the Propagation of Modern Social Worms. IEEE Trans. Inf. Forensics Secur. 12(11): 2558-2573 (2017) - [c32]Xiaochen Liu, Chunhe Xia, Tianbo Wang, Li Zhong:
CloudSec: A Novel Approach to Verifying Security Conformance at the Bottom of the Cloud. BigData Congress 2017: 569-576 - [c31]Shengwei Lei, Yang Yu, Xiaojian Li, Zhong Li, Chunhe Xia:
An Attack-oriented Task Execution Collaborative Defense Protocol. ChineseCSCW 2017: 169-172 - [c30]Mohan Zhang, Honglin Ren, Chunhe Xia:
A Dynamic Placement Policy of Virtual Machine Based on MOGA in Cloud Environment. ISPA/IUCC 2017: 885-891 - 2015
- [j9]Tianbo Wang, Chunhe Xia, Qiong Jia:
The Temporal Characteristic of Human Mobility: Modeling and Analysis of Social Worm Propagation. IEEE Commun. Lett. 19(7): 1169-1172 (2015) - [j8]Haiquan Wang, Weijian Ma, Hengkun Shi, Chunhe Xia:
An Interval Algebra-based Modeling and Routing Method in Bus Delay Tolerant Network. KSII Trans. Internet Inf. Syst. 9(4): 1376-1391 (2015) - [j7]Yang Luo, Chunhe Xia, Liangshuang Lv, Zhao Wei, Yazhuo Li:
Modeling, conflict detection, and verification of a new virtualization role-based access control framework. Secur. Commun. Networks 8(10): 1904-1925 (2015) - [c29]Shuang Xiang, Yanli Lv, Chunhe Xia, Yuanlong Li, Zhihuan Wang:
A Method of Network Security Situation Assessment Based on Hidden Markov Model. ISICA 2015: 631-639 - 2014
- [j6]Zhao Wei, Chunhe Xia, Yang Luo, Xiaochen Liu, Weikang Wu:
An Approach for Description of Computer Network Defense Scheme and Its Simulation Verification. J. Comput. 9(2): 388-395 (2014) - [c28]Yang Bo, Chunhe Xia, Yang Luo, Qing Tang:
Static Compliance Checking beyond Separation of Duty Constraints. 3PGCIC 2014: 171-178 - [c27]Xue Qiu, Qiong Jia, Shuguang Wang, Chunhe Xia, Liangshuang Lv:
Automatic Generation Algorithm of Penetration Graph in Penetration Testing. 3PGCIC 2014: 531-537 - [c26]Yanli Lv, Yuanlong Li, Shouzhong Tu, Shuang Xiang, Chunhe Xia:
Coordinated Scan Detection Algorithm Based on the Global Characteristics of Time Sequence. BWCCA 2014: 199-206 - [c25]Kai Luo, Shouzhong Tu, Chunhe Xia, Dan Zhou:
Detecting Compromised VM via Application-Aware Anomaly Detection. CIS 2014: 392-396 - [c24]Xue Qiu, Shuguang Wang, Qiong Jia, Chunhe Xia, Qingxin Xia:
An automated method of penetration testing. ComComAP 2014: 211-216 - [c23]Hua Guo, Fangchao Ma, Zhoujun Li, Chunhe Xia:
Key-Exposure Protection in Public Auditing with User Revocation in Cloud Storage. INTRUST 2014: 127-136 - 2013
- [j5]Pei Luo, Zhuangzhi Wu, Chunhe Xia, Lu Feng, Teng Ma:
Co-segmentation of 3D shapes via multi-view spectral clustering. Vis. Comput. 29(6-8): 587-597 (2013) - [c22]Xiaochen Liu, Chunhe Xia, Zhao Wei, Xiaoning Sun, Zhiqiang Zhan:
Optimal Service Selection Based on Business for Cloud Computing. CSC 2013: 92-97 - [c21]Yazhuo Li, Yang Luo, Zhao Wei, Chunhe Xia, Xiaoyan Liang:
A Verification Method of Enterprise Network Reachability Based on Topology Path. CIS 2013: 624-629 - [c20]Liming Huan, Yang Yu, Liangshuang Lv, Shiying Li, Chunhe Xia:
A Botnet-Oriented Collaborative Defense Scheme Description Language. CIS 2013: 653-657 - [c19]Cheng Zhang, Chunhe Xia, Haiquan Wang, Xiaojian Li:
On the Spatial-temporal Reachability of DTNs. ICoC 2013: 40-49 - [c18]Zhao Wei, Yanli Lv, Chunhe Xia, Yang Luo, Qing Wei:
A Computer Network Defense Policy Refinement Method. ICoC 2013: 122-133 - [c17]Xiaoyan Liang, Liangshuang Lv, Chunhe Xia, Yang Luo, Yazhuo Li:
A Conflict-Related Rules Detection Tool for Access Control Policy. ICoC 2013: 158-169 - [c16]Yang Luo, Yazhuo Li, Qing Tang, Zhao Wei, Chunhe Xia:
VRBAC: An Extended RBAC Model for Virtualized Environment and Its Conflict Checking Approach. ICoC 2013: 194-205 - 2012
- [c15]Yuting Hu, Haiquan Wang, Chunhe Xia, Weiguo Li, Ying Yang:
On the distribution of inter contact time for DTNs. LCN 2012: 152-155 - [c14]Chunhe Xia, Dong Liang, Haiquan Wang, Min Luo, Weifeng Lv:
Characterization and modeling in large-scale urban DTNs. LCN 2012: 352-359 - [c13]Zhao Wei, Chunhe Xia, Qing Wei, Shan Yao, Yujian Zhou:
Semantic Similarity Analysis between High-Level Model Description Text and Low-Level Implementation Text for Network Survivability. Web Intelligence 2012: 694-701 - 2011
- [c12]Min Luo, Haiquan Wang, Chunhe Xia, Lihua Wang, Ya Wang:
Design and Implementation of Bus Net Routing Algorithm. CIS 2011: 1474-1478 - 2010
- [c11]Jian Jiao, Shan Yao, Chunhe Xia:
Application for Artificial Bee Colony Algorithm in Migration of Mobile Agent. ICIC (3) 2010: 232-238 - [c10]Shan Yao, Jian Jiao, Chunhe Xia, Xiaojian Li:
A Tactical Intelligence Production Model of Computer Network Self-Organizing Operations. ICIC (2) 2010: 400-409
2000 – 2009
- 2009
- [j4]Yuan Zhou, Chunhe Xia, Haiquan Wang, Jianzhong Qi:
Research on Survivability of Mobile Ad-hoc Network. J. Softw. Eng. Appl. 2(1): 50-54 (2009) - [c9]Yunyun Sun, Shan Yao, Xiaojian Li, Chunhe Xia, Songmei Zhang:
An Evaluation Model of CNO Intelligence Information Confidence. WISM 2009: 400-412 - [c8]Lu Bai, Chunhe Xia, Xiaojian Li, Haiquan Wang:
A Bulk Email Oriented Multi-party Non-repudiation Exchange Protocol. WISM 2009: 426-438 - 2008
- [j3]Nan Li, Chunhe Xia, Yi Yang, Haiquan Wang:
An Algorithm for Generation of Attack Signatures Based on Sequences Alignment. J. Softw. Eng. Appl. 1(1): 76-82 (2008) - [c7]Wei He, Chunhe Xia, Haiquan Wang, Cheng Zhang, Yi Ji:
A Game Theoretical Attack-Defense Model Oriented to Network Security Risk Assessment. CSSE (6) 2008: 498-504 - [c6]Nan Li, Chunhe Xia, Yi Yang, Haiquan Wang:
An Algorithm for Generation of Attack Signatures Based on Sequences Alignment. CSSE (3) 2008: 964-969 - [c5]Yuan Zhou, Chunhe Xia, Haiquan Wang, Jianzhong Qi:
Research on Survivability of Mobile Ad Hoc Network. CSSE (3) 2008: 1084-1088 - [c4]He Wei, Chunhe Xia, Haiquan Wang, Zhang Cheng, Ji Yi:
A Game Theoretical Attack-Defense Model Oriented to Network Security Risk Assessment. CSSE (3) 2008: 1097-1103 - [c3]Nan Li, Chunhe Xia, Jianzhong Qi, Haiquan Wang:
A New Type of Self-Adaptive Mechanism for Network Survivability Based on Intrusion Deception. FGCN (1) 2008: 93-97 - [c2]Wei He, Chunhe Xia, Cheng Zhang, Yi Ji, Xinyi Ma:
A Network Security Risk Assessment Framework Based on Game Theory. FGCN (2) 2008: 249-253 - 2007
- [j2]Chunhe Xia, Yunping Shi, Xiaojian Li, Wei Gao:
P2P worm detection based on application identification. Frontiers Comput. Sci. China 1(1): 114-122 (2007) - [c1]Wei Gao, Chunhe Xia, Nan Li, Haiquan Wang:
Research on Simulation Framework of Structured P2P Network. FGCN (2) 2007: 315-319 - 2006
- [j1]Hongyan Peng, Xiaojian Li, Chunhe Xia, Jianfeng Deng, Xiaofa Zhou:
A Non-Repudiation Protocol for E-Mail and Its Formal Analysis. J. Comput. Res. Dev. 43(11): 1914-1919 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint