欢迎访问四川大学网络空间安全研究院!

院长信箱

当前位置: 首页 >> 科学研究 >> 学术成果 >> 正文

学术论文

日期:2020-09-21 来源: 作者: 关注:


2020年

1、Guolin Shao, Xingshu Chen, Xuemei Zeng and Lina Wang. Deep Learning Hierarchical Representation from Heterogeneous Flow-level Communication Data. IEEE Transactions on Information Forensics & Security, 2020, 15:1525-1540. (SCI, CCF A)

2、Rui Tang, Shuyu Jiang, Xingshu Chen, Haizhou Wang, Wenxian Wang, Wei Wang. Interlayer link prediction in multiplex social networks: An iterative degree penalty algorithm. Knowledge-Based Systems (online,SCI),2020

3、Wang X, Chen X, Wang Y, Ge L. An efficient scheme for SDN state consistency verification in cloud computing environment. Concurrency Computat Pract Exper. 2020;32:e5440 (SCI)

4、HongxiaZhang,XingshuChen, XiaoLan, HongjianJin ,QiCao.BTCAS: A Blockchain-Based Thoroughly Cross-Domain Authentication Scheme .Journal of Information Security and Applications55(2020): 102538

5、Yi Wen, Xingshu Chen, Xuemei Zeng & Wei Wang Analysis of E-mail Account Probing Attack Based on Graph Mining.Scientific Reports,2020,04(vol 10)


2019年

1、Xin Jin, Qixu Wang, Xiang Li, Xingshu Chen, and Wei Wang. Cloud virtual machine lifecycle security framework based on trusted computing[J]. Tsinghua Science and Technology, 2019, 24(5): 520-534 (SCI)

2、Mingyong Yin, Xingshu Chen,QixuWang, WeiWang, YulongWang。Dynamics on Hybrid Complex Network: Botnet Modeling and Analysis of Medical IoT.Security and Communication NetworksVolume 2019, (SCI)

3、Wang, XY (Wang, Xiaoyan); Chen, XS (Chen, Xingshu); Wang, YT (Wang, Yitong); Ge, L (Ge, Long).An efficient scheme for SDN state consistency verification in cloud computing environment.Concurrency and Computation: Practice and ExperienceVolume 32, Issue 2.2019.7(SCI)

4、XUEMEI ZENG, XINGSHU CHEN, GUOLIN SHAO, TAO HE, ZHENHUI HAN,YI WEN AND QIXU WANG.Flow Context and Host Behavior Based Shadowsocks's Traffic Identification.IEEE ACCESS, 2019, 7: 41017-41032

5、Han, ZH (Han, Zhen-Hui)[ 1,2 ] ; Chen, XS (Chen, Xing-Shu)[ 1,2 ] ; Zeng, XM (Zeng, Xue-Mei)[ 2 ] ; Zhu, Y (Zhu, Yi)[ 2 ] ; Yin, MY (Yin, Ming-Yong).Detecting Proxy User Based on Communication Behavior Portrait.The Computer Journal, 2019, bxz065


2018年

1、Wei Wang, Ming Tang, H. Eugene Stanley, and Lidia A.raunstein.Social contagions with communication channel alternation on multiplex networks.98, 062320 (2018)

2、Wang Haizhou, Chen Xingshu, Wang Wenxian, Chan Mei Ya.Content Pollution Propagation in the Overlay Network of Peer-to-Peer Live Streaming Systems: Modeling and Analysis.2018, 12(17): 2119-2131

3、W Wang, Z-X Wang,S-M Cai.Critical phenomena of information spreading dynamics on networks with cliques.98, 052312 (2018)

4、Xiang Li, Xin Jin, Qixu Wang, Mingsheng Cao, and Xingshu Chen.SCCAF: A Secure and Compliant Continuous Assessment Framework in Cloud-based IoT Context.

5、W Wang, XL Chen, LF Zhong.Social contagions with heterogeneous credibility.2018,503, 604-610


2017年

1、Wang Haizhou, Chen Xingshu, Wang Wenxian.Exploring the accuracy of capturing snapshots in large-scale P2P IPTV systems.2017, (1): e2952

2、Xin Jin,Xingshu Chen,Cheng Zhao.Trusted Attestation Architecture on an Infrastructure-as-a-Service.2017, 22 (5): 469-478

3、Shao G, Chen X, Zeng X, et al.The Analysis of Malicious Group Based on Suspicious Communication Behavior Aggregation.2017:143-164.

4、陈兴蜀,罗梁,王海舟,王文贤.基于ICE-LDA模型的中英文跨语言话题发现研究.2017,49(2):100-106

5、陈兴蜀,江天宇,曾雪梅,尹学渊,邵国林.基于多维时间序列分析的网络异常检测.2017, 49(1): 144-150


2016年

1、Xiaoming Ye, Xingshu Chen, Haizhou Wang, Xueyuan Yin, Chun Xu and Guolin Shao.An Anomalous Behavior Detection Model in Cloud Computing.2016, 21(3):322-332

2、Guolin Shao, Xingshu Chen, Xueyuan Yin, Xiaoming Ye.A fuzzy detection approach toward different speed port scan attacks based on Dempster–Shafer evidence theory.2016, 9(15): 2627-2640

3、钟 杰,陈兴蜀,王文贤,史剑虹,王海舟.面向微博话题传播的重要节点测量研究.2016,33(8):2290-2293

4、金鑫,陈兴蜀.可信链跨物理主机迁移及快速恢复方法.2016,62(2):103-109

5、罗永刚,陈兴蜀,杨露.一种MapReduce作业内存精确预测方法.2016,45(6):986-991


关闭

Copyright © 2020 All Rights Reserved - 四川大学网络空间安全研究院