Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions J Zhang, C Chen, Y Xiang, W Zhou IEEE Transactions on Information Forensics and Security 8 (1), 5-15, 2013 | 207 | 2013 |
A sword with two edges: Propagation studies on both positive and negative information in online social networks S Wen, M Haghighi, C Chen, Y Xiang, W Zhou, W Jia IEEE Transactions on Computers 64 (3), 640-653, 2014 | 166 | 2014 |
Statistical Features Based Real-time Detection of Drifted Twitter Spam C Chen, Y Wang, J Zhang, Y Xiang, W Zhou, GY Min IEEE Transactions on Information Forensics and Security 12 (4), 914 - 925, 2017 | 159 | 2017 |
An Effective Network Traffic Classification Method with Unknown Flow Detection J Zhang, C Chen, Y Xiang, W Zhou, A Vasilakos IEEE Transactions on Network and Service Management 10 (2), 133-147, 2013 | 145 | 2013 |
6 million spam tweets: A large ground truth for timely Twitter spam detection C Chen, J Zhang, X Chen, Y Xiang, W Zhou 2015 IEEE International Conference on Communications (ICC), 7065-7070, 2015 | 142 | 2015 |
A Performance Evaluation of Machine Learning-Based Streaming Spam Tweets Detection C Chen, J Zhang, Y Xie, Y Xiang, W Zhou, MM Hassan, A AlElaiwi, ... IEEE Transactions on Computational Social Systems 2 (3), 65-76, 2016 | 130 | 2016 |
Deep learning based attack detection for cyber-physical system cybersecurity: A survey J Zhang, L Pan, QL Han, C Chen, S Wen, Y Xiang IEEE/CAA Journal of Automatica Sinica 9 (3), 377-391, 2021 | 101 | 2021 |
Addressing the class imbalance problem in twitter spam detection using ensemble learning S Liu, Y Wang, J Zhang, C Chen, Y Xiang Computers & Security 69, 35-49, 2017 | 99 | 2017 |
Investigating the deceptive information in twitter spam C Chen, S Wen, J Zhang, Y Xiang, J Oliver, A Alelaiwi, MM Hassan Future Generation Computer Systems 72, 319-326, 2017 | 62 | 2017 |
Machine Learning Based Cyber Attacks Targeting on Controlled Information: A Survey Y Miao, C Chen, L Pan, QL Han, J Zhang, Y Xiang ACM Computing Surveys 54 (7), 136:1-36, 2021 | 57 | 2021 |
Anomaly-Based Insider Threat Detection Using Deep Autoencoders L Liu, O De Vel, C Chen, J Zhang, Y Xiang 2018 IEEE International Conference on Data Mining Workshops (ICDMW), 39-48, 2018 | 51 | 2018 |
Asymmetric self-learning for tackling twitter spam drift C Chen, J Zhang, Y Xiang, W Zhou 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2015 | 41 | 2015 |
An in-depth analysis of abuse on twitter J Oliver, P Pajares, C Ke, C Chen, Y Xiang Trend Micro 225, 1-22, 2014 | 41 | 2014 |
Spammers Are Becoming "Smarter" on Twitter C Chen, J Zhang, Y Xiang, W Zhou, J Oliver IT Professional 18 (2), 66-70, 2016 | 40 | 2016 |
A performance evaluation of deep‐learnt features for software vulnerability detection X Ban, S Liu, C Chen, C Chua Concurrency and Computation: Practice and Experience 31 (19), 2019 | 35 | 2019 |
Cyber Vulnerability Intelligence for IoT Binary S Liu, M Dibaei, Y Tai, C Chen, J Zhang, Y Xiang IEEE Transactions on Industrial Informatics 3 (16), 2154 - 2163, 2020 | 28* | 2020 |
Insider threat identification using the simultaneous neural learning of multi-source logs L Liu, C Chen, J Zhang, O De Vel, Y Xiang IEEE Access 7, 183162-183176, 2019 | 25 | 2019 |
Robust network traffic identification with unknown applications J Zhang, C Chen, Y Xiang, W Zhou Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 23 | 2013 |
Semi-supervised and Compound Classification of Network Traffic J Zhang, C Chen, Y Xiang, W Zhou Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International …, 2012 | 21 | 2012 |
Semi-supervised and compound classification of network traffic J Zhang, C Chen, Y Xiang, W Zhou International Journal of Security and Networks 7 (4), 252-261, 2012 | 21 | 2012 |