Secure multi-party computation: theory, practice and applications C Zhao, S Zhao, M Zhao, Z Chen, CZ Gao, H Li, Y Tan
Information Sciences 476, 357-372, 2019
330 2019 Machine learning based mobile malware detection using highly imbalanced network traffic Z Chen, Q Yan, H Han, S Wang, L Peng, L Wang, B Yang
Information Sciences 433, 346-364, 2018
184 2018 Detecting android malware leveraging text semantics of network flows S Wang, Q Yan, Z Chen, B Yang, C Zhao, M Conti
IEEE Transactions on Information Forensics and Security 13 (5), 1096-1109, 2017
143 2017 A mobile malware detection method using behavior features in network traffic S Wang, Z Chen, Q Yan, B Yang, L Peng, Z Jia
Journal of Network and Computer Applications 133, 15-25, 2019
126 2019 Healthchain: A novel framework on privacy preservation of electronic health records using blockchain technology S Chenthara, K Ahmed, H Wang, F Whittaker, Z Chen
Plos one 15 (12), e0243043, 2020
121 2020 A high-accuracy, real-time, intelligent material perception system with a machine-learning-motivated pressure-sensitive electronic skin X Wei, H Li, W Yue, S Gao, Z Chen, Y Li, G Shen
Matter 5 (5), 1481-1501, 2022
107 2022 Using linguistic features to estimate suicide probability of Chinese microblog users L Zhang, X Huang, T Liu, A Li, Z Chen, T Zhu
Human Centered Computing: First International Conference, HCC 2014, Phnom …, 2015
98 2015 Sn3O4/rGO heterostructure as a material for formaldehyde gas sensor with a wide detecting range and low operating temperature F Yin, Y Li, W Yue, S Gao, C Zhang, Z Chen
Sensors and Actuators B: Chemical 312, 127954, 2020
91 2020 Efficient signature generation for classifying cross-architecture IoT malware M Alhanahnah, Q Lin, Q Yan, N Zhang, Z Chen
2018 IEEE conference on communications and network security (CNS), 1-9, 2018
89 2018 Trafficav: An effective and explainable detection of mobile malware behavior using network traffic S Wang, Z Chen, L Zhang, Q Yan, B Yang, L Peng, Z Jia
2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS), 1-6, 2016
82 2016 Gaussian distribution based oversampling for imbalanced data classification Y Xie, M Qiu, H Zhang, L Peng, Z Chen
IEEE Transactions on Knowledge and Data Engineering 34 (2), 667-679, 2020
81 2020 Traffic classification using probabilistic neural networks R Sun, B Yang, L Peng, Z Chen, L Zhang, S Jing
2010 Sixth International Conference on Natural Computation 4, 1914-1919, 2010
75 2010 Deep and broad URL feature mining for android malware detection S Wang, Z Chen, Q Yan, K Ji, L Peng, B Yang, M Conti
Information Sciences 513, 600-613, 2020
61 2020 Ranking-based biased learning swarm optimizer for large-scale optimization H Deng, L Peng, H Zhang, B Yang, Z Chen
Information Sciences 493, 120-137, 2019
61 2019 Effectiveness of statistical features for early stage internet traffic identification L Peng, B Yang, Y Chen, Z Chen
International Journal of Parallel Programming 44, 181-197, 2016
59 2016 Droidclassifier: Efficient adaptive mining of application-layer header for classifying android malware Z Li, L Sun, Q Yan, W Srisa-an, Z Chen
Security and Privacy in Communication Networks: 12th International …, 2017
52 2017 Online hybrid traffic classifier for Peer-to-Peer systems based on network processors Z Chen, B Yang, Y Chen, A Abraham, C Grosan, L Peng
Applied Soft Computing 9 (2), 685-694, 2009
46 2009 RC-chain: Reputation-based crowdsourcing blockchain for vehicular networks L Sun, Q Yang, X Chen, Z Chen
Journal of network and computer applications 176, 102956, 2021
42 2021 : Privacy‐preserving collaborative deep learning against leakage from gradient sharingQ Zhao, C Zhao, S Cui, S Jing, Z Chen
International Journal of Intelligent Systems 35 (8), 1262-1279, 2020
39 2020 A first look at android malware traffic in first few minutes Z Chen, H Han, Q Yan, B Yang, L Peng, L Zhang, J Li
2015 IEEE Trustcom/BigDataSE/ISPA 1, 206-213, 2015
36 2015