欢迎访问四川大学网络空间安全研究院!

院长信箱

当前位置: 首页 >> 科学研究 >> 学术成果 >> 正文

学术论文

日期:2024-03-26 来源: 作者: 关注:


2023年

1、 Laws and Regulations tell how to classify your data: A case study on higher education

2、Review on the application of deep learning in network attack detection

3、Unveiling Qzone: A measurement study of a large-scale online social network

4、Efficient and secure quantile aggregation of private data streams

5、Interlayer Link Prediction in Multiplex Social Networks Based on Multiple Types of Consistency Between Embedding Vectors


2022年

1、Yulong Wang; Qixu Wang; Xingshu Chen; Dajiang Chen; Xiaojie Fang; Mingyong Yin; Ning Zhang.  ContainerGuard: A Real-Time Attack Detection System in Container-based Big Data Platform. IEEE Transactions on Industrial Informatics, 2022, 18(5):3327-3336.

2、Qixu Wang, Xingshu Chen, Xin Jin, Xiang Li, Dajiang Chen, Xue Qin.Enhancing Trustworthiness of Internet of Vehicles in Space-Air-Ground Integrated Networks: Attestation Approach.  IEEE Internet of Things Journal,2022, 9(8): 5992-6002.

3、Rui Tang, Xingshu Chen, Chuancheng Wei, Qindong Li, Wenxian Wang, Haizhou Wang, Wei Wang.Interlayer link prediction based on multiple network structural attributes. Computer Networks, 2022, 203: 108651

4、Rui Tang, Shuyu Jiang, Xingshu Chen, Wenxian Wang, Wei Wang.  Network structural perturbation against interlayer link prediction. Knowledge-Based Systems, 2022, 250: 109095

5、Yang L, Chen X, Luo Y, Lan X, & Wang W. IDEA: A Utility-Enhanced Approach to Incomplete Data Stream Anonymization. Tsinghua Science and Technology, 2022, 7(1): 127–140.


2021年

1、Lina Wang, Xingshu Chen , Rui Tang, Yawei Yue, Yi Zhu, Xuemei Zeng, Wei Wang. Improving adversarial robustness of deep neural networks by using semantic information. Knowledge-Based Systems, 2021, 226: 107141.

2、Chunhui Li, Xingshu Chen, Haizhou Wang, Peiming Wang, Yu Zhang, Wenxian Wang.End-to-end attack on text-based CAPTCHAs based on cycle-consistent generative adversarial network. Neurocomputing,2021,433: 223-236.

3、Yifei Jian,Hongbo Kuang,Chenglong Ren,Zicheng Ma,Haizhou Wang. A Novel Framework for Image-Based Malware Detection with a Deep Neural Network. Computers & Security,2021,109:102400.

4、陈兴蜀,蔡梦娟,王伟,王启旭,金鑫.  VMOffset:虚拟机自省中一种语义重构改进方法.软件学报, 202132(10)3293-3309.

5、陈兴蜀,金逸灵,王玉龙,蒋超,王启旭. 基于长短期记忆神经网络的容器内进程异常行为检测. 电子学报,202149(01)149-156.


2020年

1、Guolin Shao, Xingshu Chen, Xuemei Zeng and Lina Wang. Deep Learning Hierarchical Representation from Heterogeneous Flow-level Communication Data. IEEE Transactions on Information Forensics & Security, 2020, 15:1525-1540. (SCI, CCF A)

2、Rui Tang, Shuyu Jiang, Xingshu Chen, Haizhou Wang, Wenxian Wang, Wei Wang. Interlayer link prediction in multiplex social networks: An iterative degree penalty algorithm. Knowledge-Based Systems (online,SCI),2020

3、Wang X, Chen X, Wang Y, Ge L. An efficient scheme for SDN state consistency verification in cloud computing environment. Concurrency Computat Pract Exper. 2020;32:e5440 (SCI)

4、HongxiaZhang,XingshuChen, XiaoLan, HongjianJin ,QiCao.BTCAS: A Blockchain-Based Thoroughly Cross-Domain Authentication Scheme .Journal of Information Security and Applications55(2020): 102538

5、Yi Wen, Xingshu Chen, Xuemei Zeng & Wei Wang Analysis of E-mail Account Probing Attack Based on Graph Mining.Scientific Reports,2020,04(vol 10)


2019年

1、Xin Jin, Qixu Wang, Xiang Li, Xingshu Chen, and Wei Wang. Cloud virtual machine lifecycle security framework based on trusted computing[J]. Tsinghua Science and Technology, 2019, 24(5): 520-534 (SCI)

2、Mingyong Yin, Xingshu Chen,QixuWang, WeiWang, YulongWang。Dynamics on Hybrid Complex Network: Botnet Modeling and Analysis of Medical IoT.Security and Communication NetworksVolume 2019, (SCI)

3、Wang, XY (Wang, Xiaoyan); Chen, XS (Chen, Xingshu); Wang, YT (Wang, Yitong); Ge, L (Ge, Long).An efficient scheme for SDN state consistency verification in cloud computing environment.Concurrency and Computation: Practice and ExperienceVolume 32, Issue 2.2019.7(SCI)

4、XUEMEI ZENG, XINGSHU CHEN, GUOLIN SHAO, TAO HE, ZHENHUI HAN,YI WEN AND QIXU WANG.Flow Context and Host Behavior Based Shadowsocks's Traffic Identification.IEEE ACCESS, 2019, 7: 41017-41032

5、Han, ZH (Han, Zhen-Hui)[ 1,2 ] ; Chen, XS (Chen, Xing-Shu)[ 1,2 ] ; Zeng, XM (Zeng, Xue-Mei)[ 2 ] ; Zhu, Y (Zhu, Yi)[ 2 ] ; Yin, MY (Yin, Ming-Yong).Detecting Proxy User Based on Communication Behavior Portrait.The Computer Journal, 2019, bxz065


2018年

1、Wei Wang, Ming Tang, H. Eugene Stanley, and Lidia A.raunstein.Social contagions with communication channel alternation on multiplex networks.98, 062320 (2018)

2、Wang Haizhou, Chen Xingshu, Wang Wenxian, Chan Mei Ya.Content Pollution Propagation in the Overlay Network of Peer-to-Peer Live Streaming Systems: Modeling and Analysis.2018, 12(17): 2119-2131

3、W Wang, Z-X Wang,S-M Cai.Critical phenomena of information spreading dynamics on networks with cliques.98, 052312 (2018)

4、Xiang Li, Xin Jin, Qixu Wang, Mingsheng Cao, and Xingshu Chen.SCCAF: A Secure and Compliant Continuous Assessment Framework in Cloud-based IoT Context.

5、W Wang, XL Chen, LF Zhong.Social contagions with heterogeneous credibility.2018,503, 604-610


2017年

1、Wang Haizhou, Chen Xingshu, Wang Wenxian.Exploring the accuracy of capturing snapshots in large-scale P2P IPTV systems.2017, (1): e2952

2、Xin Jin,Xingshu Chen,Cheng Zhao.Trusted Attestation Architecture on an Infrastructure-as-a-Service.2017, 22 (5): 469-478

3、Shao G, Chen X, Zeng X, et al.The Analysis of Malicious Group Based on Suspicious Communication Behavior Aggregation.2017:143-164.

4、陈兴蜀,罗梁,王海舟,王文贤.基于ICE-LDA模型的中英文跨语言话题发现研究.2017,49(2):100-106

5、陈兴蜀,江天宇,曾雪梅,尹学渊,邵国林.基于多维时间序列分析的网络异常检测.2017, 49(1): 144-150


2016年

1、Xiaoming Ye, Xingshu Chen, Haizhou Wang, Xueyuan Yin, Chun Xu and Guolin Shao.An Anomalous Behavior Detection Model in Cloud Computing.2016, 21(3):322-332

2、Guolin Shao, Xingshu Chen, Xueyuan Yin, Xiaoming Ye.A fuzzy detection approach toward different speed port scan attacks based on Dempster–Shafer evidence theory.2016, 9(15): 2627-2640

3、钟 杰,陈兴蜀,王文贤,史剑虹,王海舟.面向微博话题传播的重要节点测量研究.2016,33(8):2290-2293

4、金鑫,陈兴蜀.可信链跨物理主机迁移及快速恢复方法.2016,62(2):103-109

5、罗永刚,陈兴蜀,杨露.一种MapReduce作业内存精确预测方法.2016,45(6):986-991


下一条:发明专利

关闭

Copyright © 2020 All Rights Reserved - 四川大学网络空间安全研究院