Follow
Chunhe Xia
Chunhe Xia
Verified email at buaa.edu.cn
Title
Cited by
Cited by
Year
A game theoretical attack-defense model oriented to network security risk assessment
W He, C Xia, H Wang, C Zhang, Y Ji
2008 International Conference on Computer Science and Software Engineering 6 …, 2008
792008
Social network behavior and public opinion manipulation
L Chen, J Chen, C Xia
Journal of Information Security and Applications 64, 103060, 2022
752022
HNN: a novel model to study the intrusion detection based on multi-feature correlation and temporal-spatial analysis
S Lei, C Xia, Z Li, X Li, T Wang
IEEE Transactions on Network Science and Engineering, 2021
362021
Automatic generation algorithm of penetration graph in penetration testing
X Qiu, Q Jia, S Wang, C Xia, L Lv
2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and …, 2014
342014
A network security risk assessment framework based on game theory
W He, C Xia, C Zhang, Y Ji, X Ma
2008 Second International Conference on Future Generation Communication and …, 2008
272008
Capturing Dynamics of Information Diffusion in SNS: A Survey of Methodology and Techniques
H Li, C Xia, T Wang, S Wen, C Chen, Y Xiang
ACM Computing Surveys (CSUR) 55 (1), 1-51, 2021
252021
An automated method of penetration testing
X Qiu, S Wang, Q Jia, C Xia, Q Xia
2014 IEEE Computers, Communications and IT Applications Conference, 211-216, 2014
252014
Characterization and modeling in large-scale urban DTNs
C Xia, D Liang, H Wang, M Luo, W Lv
37th Annual IEEE Conference on Local Computer Networks, 352-359, 2012
242012
A BERT-based Ensemble Model for Chinese News Topic Prediction
J Liu, C Xia, X Li, H Yan, T Liu
Proceedings of the 2020 2nd International Conference on Big Data Engineering …, 2020
232020
A novel intrusion detector based on deep learning hybrid methods
S Wang, C Xia, T Wang
2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity …, 2019
232019
Detection, Traceability, and Propagation of Mobile Malware Threats
L Chen, C Xia, S Lei, T Wang
IEEE Access 9, 14576-14598, 2021
222021
Co-segmentation of 3D shapes via multi-view spectral clustering
P Luo, Z Wu, C Xia, L Feng, T Ma
The Visual Computer 29 (6), 587-597, 2013
202013
The spatial–temporal perspective: The study of the propagation of modern social worms
T Wang, C Xia, Z Li, X Liu, Y Xiang
IEEE Transactions on Information Forensics and Security 12 (11), 2558-2573, 2017
182017
SADI: a novel model to study the propagation of social worms in hierarchical networks
T Wang, C Xia, S Wen, H Xue, Y Xiang, S Tu
IEEE Transactions on Dependable and Secure Computing 16 (1), 142-155, 2017
172017
Research on epidemic models of P2P worm in structured peer-to-peer networks
CH Xia, YP Shi, XJ Li
Jisuanji Xuebao(Chinese Journal of Computers) 29 (6), 952-959, 2006
162006
Hierarchical comprehensive context modeling for Chinese text classification
J Liu, C Xia, H Yan, Z Xie, J Sun
IEEE Access 7, 154546-154559, 2019
152019
A behavior-aware SLA-based framework for guaranteeing the security conformance of cloud service
X Liu, C Xia, T Wang, L Zhong, X Li
Frontiers of Computer Science 14 (6), 1-17, 2020
142020
Vulnerability evaluation based on CVSS and environmental information statistics
S Wang, C Xia, J Gao, Q Jia
2015 4th International Conference on Computer Science and Network Technology …, 2015
122015
On the distribution of inter contact time for DTNs
Y Hu, H Wang, C Xia, W Li, Y Yang
37th Annual IEEE Conference on Local Computer Networks, 152-155, 2012
122012
Epidemic Heterogeneity and Hierarchy: A Study of Wireless Hybrid Worm Propagation
T Wang, C Xia, X Li, Y Xiang
IEEE Transactions on Mobile Computing, 2020
112020
The system can't perform the operation now. Try again later.
Articles 1–20