A survey on ethereum systems security: Vulnerabilities, attacks, and defenses H Chen, M Pendleton, L Njilla, S Xu ACM Computing Surveys (CSUR) 53 (3), 1-43, 2020 | 515 | 2020 |
Statistical estimation of malware detection metrics in the absence of ground truth P Du, Z Sun, H Chen, JH Cho, S Xu IEEE Transactions on Information Forensics and Security 13 (12), 2965-2980, 2018 | 49 | 2018 |
Quantifying the security effectiveness of firewalls and dmzs H Chen, JH Cho, S Xu Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the …, 2018 | 43 | 2018 |
Blockchain-based automated and robust cyber security management S He, E Ficke, MMA Pritom, H Chen, Q Tang, Q Chen, M Pendleton, ... Journal of Parallel and Distributed Computing 163, 62-82, 2022 | 24 | 2022 |
Quantifying the security effectiveness of network diversity: poster H Chen, JH Cho, S Xu Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the …, 2018 | 24 | 2018 |
Quantifying cybersecurity effectiveness of dynamic network diversity H Chen, H Cam, S Xu IEEE Transactions on Dependable and Secure Computing 19 (6), 3804-3821, 2021 | 12 | 2021 |
Optimizing interconnections to maximize the spectral radius of interdependent networks H Chen, X Zhao, F Liu, S Xu, W Lu Physical Review E 95 (3), 032308, 2017 | 10 | 2017 |
Theoretical convergence guaranteed resource-adaptive federated learning with mixed heterogeneity Y Wang, X Zhang, M Li, T Lan, H Chen, H Xiong, X Cheng, D Yu Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and …, 2023 | 5 | 2023 |
AST2Vec: A Robust Neural Code Representation for Malicious PowerShell Detection H Miao, H Bao, Z Tang, W Li, W Wang, H Chen, F Liu, Y Sun International Conference on Science of Cyber Security, 207-224, 2023 | 1 | 2023 |
Method and system for blockchain-based cyber security management S Xu, HE Songlin, E Ficke, MMA Pritom, C Huashan, Q Tang, Q Chen, ... US Patent App. 17/733,580, 2023 | 1 | 2023 |
Quantifying Cybersecurity Effectiveness of Software Diversity H Chen, RB Garcia-Lebron, Z Sun, JH Cho, S Xu arXiv preprint arXiv:2111.10090, 2021 | 1 | 2021 |
Stories behind decisions: Towards interpretable malware family classification with hierarchical attention H Bao, W Li, H Chen, H Miao, Q Wang, Z Tang, F Liu, W Wang Computers & Security, 103943, 2024 | | 2024 |
Reordering and Compression for Hypergraph Processing Y Liu, Q Luo, M Xiao, D Yu, H Chen, X Cheng IEEE Transactions on Computers, 2024 | | 2024 |
Keeping Your Enemies Closer: Shedding Light on the Attacker’s Optimal Strategy W Cai, H Chen, F Liu International Conference on Science of Cyber Security, 42-59, 2023 | | 2023 |
Optimal strategy selection for attack graph games using deep reinforcement learning Y Zhang, F Liu, H Chen 2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th …, 2022 | | 2022 |
Optimal Strategy Selection for Cyber Deception via Deep Reinforcement Learning Y Zhang, F Liu, H Chen 2022 IEEE Smartworld, Ubiquitous Intelligence & Computing, Scalable …, 2022 | | 2022 |
A Framework for Quantifying Security Effectiveness of Cyber Defenses H Chen The University of Texas at San Antonio, 2021 | | 2021 |
Simulations of Event-Based Cyber Dynamics via Adversarial Machine Learning Z Liu, Y Wang, H Chen, W Lu Science of Cyber Security: Third International Conference, SciSec 2021 …, 2021 | | 2021 |