A game theoretical attack-defense model oriented to network security risk assessment W He, C Xia, H Wang, C Zhang, Y Ji 2008 International Conference on Computer Science and Software Engineering 6 …, 2008 | 79 | 2008 |
Social network behavior and public opinion manipulation L Chen, J Chen, C Xia Journal of Information Security and Applications 64, 103060, 2022 | 75 | 2022 |
HNN: a novel model to study the intrusion detection based on multi-feature correlation and temporal-spatial analysis S Lei, C Xia, Z Li, X Li, T Wang IEEE Transactions on Network Science and Engineering, 2021 | 36 | 2021 |
Automatic generation algorithm of penetration graph in penetration testing X Qiu, Q Jia, S Wang, C Xia, L Lv 2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and …, 2014 | 34 | 2014 |
A network security risk assessment framework based on game theory W He, C Xia, C Zhang, Y Ji, X Ma 2008 Second International Conference on Future Generation Communication and …, 2008 | 27 | 2008 |
Capturing Dynamics of Information Diffusion in SNS: A Survey of Methodology and Techniques H Li, C Xia, T Wang, S Wen, C Chen, Y Xiang ACM Computing Surveys (CSUR) 55 (1), 1-51, 2021 | 25 | 2021 |
An automated method of penetration testing X Qiu, S Wang, Q Jia, C Xia, Q Xia 2014 IEEE Computers, Communications and IT Applications Conference, 211-216, 2014 | 25 | 2014 |
Characterization and modeling in large-scale urban DTNs C Xia, D Liang, H Wang, M Luo, W Lv 37th Annual IEEE Conference on Local Computer Networks, 352-359, 2012 | 24 | 2012 |
A BERT-based Ensemble Model for Chinese News Topic Prediction J Liu, C Xia, X Li, H Yan, T Liu Proceedings of the 2020 2nd International Conference on Big Data Engineering …, 2020 | 23 | 2020 |
A novel intrusion detector based on deep learning hybrid methods S Wang, C Xia, T Wang 2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity …, 2019 | 23 | 2019 |
Detection, Traceability, and Propagation of Mobile Malware Threats L Chen, C Xia, S Lei, T Wang IEEE Access 9, 14576-14598, 2021 | 22 | 2021 |
Co-segmentation of 3D shapes via multi-view spectral clustering P Luo, Z Wu, C Xia, L Feng, T Ma The Visual Computer 29 (6), 587-597, 2013 | 20 | 2013 |
The spatial–temporal perspective: The study of the propagation of modern social worms T Wang, C Xia, Z Li, X Liu, Y Xiang IEEE Transactions on Information Forensics and Security 12 (11), 2558-2573, 2017 | 18 | 2017 |
SADI: a novel model to study the propagation of social worms in hierarchical networks T Wang, C Xia, S Wen, H Xue, Y Xiang, S Tu IEEE Transactions on Dependable and Secure Computing 16 (1), 142-155, 2017 | 17 | 2017 |
Research on epidemic models of P2P worm in structured peer-to-peer networks CH Xia, YP Shi, XJ Li Jisuanji Xuebao(Chinese Journal of Computers) 29 (6), 952-959, 2006 | 16 | 2006 |
Hierarchical comprehensive context modeling for Chinese text classification J Liu, C Xia, H Yan, Z Xie, J Sun IEEE Access 7, 154546-154559, 2019 | 15 | 2019 |
A behavior-aware SLA-based framework for guaranteeing the security conformance of cloud service X Liu, C Xia, T Wang, L Zhong, X Li Frontiers of Computer Science 14 (6), 1-17, 2020 | 14 | 2020 |
Vulnerability evaluation based on CVSS and environmental information statistics S Wang, C Xia, J Gao, Q Jia 2015 4th International Conference on Computer Science and Network Technology …, 2015 | 12 | 2015 |
On the distribution of inter contact time for DTNs Y Hu, H Wang, C Xia, W Li, Y Yang 37th Annual IEEE Conference on Local Computer Networks, 152-155, 2012 | 12 | 2012 |
Epidemic Heterogeneity and Hierarchy: A Study of Wireless Hybrid Worm Propagation T Wang, C Xia, X Li, Y Xiang IEEE Transactions on Mobile Computing, 2020 | 11 | 2020 |