HNN: a novel model to study the intrusion detection based on multi-feature correlation and temporal-spatial analysis S Lei, C Xia, Z Li, X Li, T Wang IEEE Transactions on Network Science and Engineering 8 (4), 3257-3274, 2021 | 26 | 2021 |
A novel intrusion detector based on deep learning hybrid methods S Wang, C Xia, T Wang 2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity …, 2019 | 21 | 2019 |
Capturing dynamics of information diffusion in SNS: A survey of methodology and techniques H Li, C Xia, T Wang, S Wen, C Chen, Y Xiang ACM Computing Surveys (CSUR) 55 (1), 1-51, 2021 | 18 | 2021 |
SADI: A novel model to study the propagation of social worms in hierarchical networks T Wang, C Xia, S Wen, H Xue, Y Xiang, S Tu IEEE Transactions on Dependable and Secure Computing 16 (1), 142-155, 2019 | 17 | 2019 |
The spatial–temporal perspective: The study of the propagation of modern social worms T Wang, C Xia, Z Li, X Liu, Y Xiang IEEE Transactions on Information Forensics and Security 12 (11), 2558-2573, 2017 | 17 | 2017 |
Secure and temporary access delegation with equality test for cloud-assisted IoV W Li, C Xia, C Wang, T Wang IEEE Transactions on Intelligent Transportation Systems 23 (11), 20187-20201, 2022 | 15 | 2022 |
Detection, traceability, and propagation of mobile malware threats L Chen, C Xia, S Lei, T Wang IEEE Access 9, 14576-14598, 2021 | 12 | 2021 |
A behavior-aware SLA-based framework for guaranteeing the security conformance of cloud service X Liu, C Xia, T Wang, L Zhong, X Li Frontiers of Computer Science 14, 1-17, 2020 | 12 | 2020 |
Robust reasoning over heterogeneous textual information for fact verification Y Wang, C Xia, C Si, B Yao, T Wang IEEE Access 8, 157140-157150, 2020 | 11 | 2020 |
The temporal characteristic of human mobility: Modeling and analysis of social worm propagation T Wang, C Xia, Q Jia IEEE Communications Letters 19 (7), 1169-1172, 2015 | 11 | 2015 |
Epidemic heterogeneity and hierarchy: A study of wireless hybrid worm propagation T Wang, C Xia, X Li, Y Xiang IEEE Transactions on Mobile Computing 21 (5), 1639-1656, 2020 | 9 | 2020 |
CloudSec: A novel approach to verifying security conformance at the bottom of the cloud X Liu, C Xia, T Wang, L Zhong 2017 IEEE International Congress on Big Data (BigData Congress), 569-576, 2017 | 6 | 2017 |
From the dialectical perspective: Modeling and exploiting of hybrid worm propagation T Wang, H Li, C Xia, H Zhang, P Zhang IEEE Transactions on Information Forensics and Security 18, 1610-1624, 2023 | 5 | 2023 |
The Graph Reasoning Approach Based on the Dynamic Knowledge Auxiliary for Complex Fact Verification Y Wang, C Xia, C Si, C Zhang, T Wang Electronics 9 (9), 1472, 2020 | 5 | 2020 |
Ghscn: A graph neural network-based api popularity prediction method in service ecosystem Z Li, X Liu, T Wang, W He, C Xia IEEE Access 8, 137032-137051, 2020 | 4 | 2020 |
Topic reconstruction: A novel method based on LDA oriented to intrusion detection S Lei, C Xia, T Wang, S Wang Algorithms and Architectures for Parallel Processing: 19th International …, 2020 | 3 | 2020 |
PPBFL: A Privacy Protected Blockchain-based Federated Learning Model Y Li, C Xia, W Lin, T Wang arXiv preprint arXiv:2401.01204, 2024 | 2 | 2024 |
Applying Value-Based Deep Reinforcement Learning on KPI Time Series Anomaly Detection Y Zhang, T Wang 2022 IEEE 15th International Conference on Cloud Computing (CLOUD), 197-202, 2022 | 2 | 2022 |
A heterogeneous graph attention network-based web service link prediction W He, C Xia, Z Li, X Liu, T Wang 2021 3rd International Conference on Computer Communication and the Internet …, 2021 | 2 | 2021 |
LCHI: Low‐Order Correlation and High‐Order Interaction Integrated Model Oriented to Network Intrusion Detection S Lei, C Xia, T Wang Wireless Communications and Mobile Computing 2021 (1), 6830372, 2021 | 2 | 2021 |