Follow
Zhenxiang Chen
Title
Cited by
Cited by
Year
Secure multi-party computation: theory, practice and applications
C Zhao, S Zhao, M Zhao, Z Chen, CZ Gao, H Li, Y Tan
Information Sciences 476, 357-372, 2019
3192019
Machine learning based mobile malware detection using highly imbalanced network traffic
Z Chen, Q Yan, H Han, S Wang, L Peng, L Wang, B Yang
Information Sciences 433, 346-364, 2018
1782018
Detecting android malware leveraging text semantics of network flows
S Wang, Q Yan, Z Chen, B Yang, C Zhao, M Conti
IEEE Transactions on Information Forensics and Security 13 (5), 1096-1109, 2017
1402017
A mobile malware detection method using behavior features in network traffic
S Wang, Z Chen, Q Yan, B Yang, L Peng, Z Jia
Journal of Network and Computer Applications 133, 15-25, 2019
1222019
Healthchain: A novel framework on privacy preservation of electronic health records using blockchain technology
S Chenthara, K Ahmed, H Wang, F Whittaker, Z Chen
Plos one 15 (12), e0243043, 2020
1192020
Using linguistic features to estimate suicide probability of Chinese microblog users
L Zhang, X Huang, T Liu, A Li, Z Chen, T Zhu
Human Centered Computing: First International Conference, HCC 2014, Phnom …, 2015
982015
Efficient signature generation for classifying cross-architecture IoT malware
M Alhanahnah, Q Lin, Q Yan, N Zhang, Z Chen
2018 IEEE conference on communications and network security (CNS), 1-9, 2018
892018
Trafficav: An effective and explainable detection of mobile malware behavior using network traffic
S Wang, Z Chen, L Zhang, Q Yan, B Yang, L Peng, Z Jia
2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS), 1-6, 2016
822016
Gaussian distribution based oversampling for imbalanced data classification
Y Xie, M Qiu, H Zhang, L Peng, Z Chen
IEEE Transactions on Knowledge and Data Engineering 34 (2), 667-679, 2020
802020
Traffic classification using probabilistic neural networks
R Sun, B Yang, L Peng, Z Chen, L Zhang, S Jing
2010 Sixth International Conference on Natural Computation 4, 1914-1919, 2010
752010
Deep and broad URL feature mining for android malware detection
S Wang, Z Chen, Q Yan, K Ji, L Peng, B Yang, M Conti
Information Sciences 513, 600-613, 2020
612020
Ranking-based biased learning swarm optimizer for large-scale optimization
H Deng, L Peng, H Zhang, B Yang, Z Chen
Information Sciences 493, 120-137, 2019
602019
Effectiveness of statistical features for early stage internet traffic identification
L Peng, B Yang, Y Chen, Z Chen
International Journal of Parallel Programming 44, 181-197, 2016
592016
Droidclassifier: Efficient adaptive mining of application-layer header for classifying android malware
Z Li, L Sun, Q Yan, W Srisa-an, Z Chen
Security and Privacy in Communication Networks: 12th International …, 2017
522017
Online hybrid traffic classifier for Peer-to-Peer systems based on network processors
Z Chen, B Yang, Y Chen, A Abraham, C Grosan, L Peng
Applied Soft Computing 9 (2), 685-694, 2009
462009
RC-chain: Reputation-based crowdsourcing blockchain for vehicular networks
L Sun, Q Yang, X Chen, Z Chen
Journal of network and computer applications 176, 102956, 2021
422021
: Privacy‐preserving collaborative deep learning against leakage from gradient sharing
Q Zhao, C Zhao, S Cui, S Jing, Z Chen
International Journal of Intelligent Systems 35 (8), 1262-1279, 2020
382020
A first look at android malware traffic in first few minutes
Z Chen, H Han, Q Yan, B Yang, L Peng, L Zhang, J Li
2015 IEEE Trustcom/BigDataSE/ISPA 1, 206-213, 2015
362015
Improvement of neural network classifier using floating centroids
L Wang, B Yang, Y Chen, A Abraham, H Sun, Z Chen, H Wang
Knowledge and Information Systems 31, 433-454, 2012
342012
GIST: A generative model with individual and subgroup-based topics for group recommendation
K Ji, Z Chen, R Sun, K Ma, Z Yuan, G Xu
Expert Systems with Applications 94, 81-93, 2018
332018
The system can't perform the operation now. Try again later.
Articles 1–20