Publications by: Chao Chen

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0 [feed] RSS 2.0
Number of items: 20.

Miao, Yuantian, Minhui, Xue, Chen, Chao, Pan, Lei, Zhang, Jun, Zhao, Benjamin Zi Hao, Kaafar, Dali, and Xiang, Yang (2021) The audio auditor: user-level membership inference in Internet of Things voice services. Proceedings on Privacy Enhancing Technologies, 2021 (1). pp. 209-228.

Liu, Shigang, Dibaei, Mahdi, Tai, Yonghang, Chen, Chao, Zhang, Jun, and Xiang, Yang (2020) Cyber vulnerability intelligence for Internet of Things binary. IEEE Transactions on Industrial Informatics, 16 (3). pp. 2154-2163.

Ban, Xinbo, Chen, Chao, Liu, Shigang, Wang, Yu, and Zhang, Jun (2019) Deep-learnt features for Twitter spam detection. In: Proceedings of the 2018 International Symposium on Security and Privacy in Social Networks and Big Data. pp. 208-212. From: SocialSec 2018: International Symposium on Security and Privacy in Social Networks and Big Data, 10-11 December 2018, Santa Clara, CA, USA.

Liu, Zian, Chen, Chao, Liu, Shigang, Liu, Dongxi, and Wang, Yu (2019) Exploit in smart devices: a case study. In: Communications in Computer and Information Science (1095) pp. 152-164. From: SocialSec 2019: 5th International Symposium on Security and Privacy in Social Networks and Big Data, 14-17 July 2019, Copenhagen, Denmark.

Liu, Liu, Chen, Chao, Zhang, Jun, De Vel, Olivier, and Xiang, Yang (2019) Insider threat identification using the simultaneous neural learning of multi-source logs. IEEE Access, 7. pp. 183162-183176.

Liu, Liu, Chen, Chao, Zhang, Jun, De Vel, Olivier, and Xiang, Yang (2019) Unsupervised insider detection through neural feature learning and model optimisation. In: Lecture Notes in Computer Science (11928) pp. 18-36. From: NSS 2019: 13th International Conference on Network and System Security, 15-18 December 2019, Sapporo, Japan.

Ban, Xinbo, Liu, Shigang, Chen, Chao, and Chua, Caslon (2019) A performance evaluation of deep-learnt features for software vulnerability detection. Concurrency and Computation: Practice and Experience, 31 (19). e5103.

Liu, Liu, De Vel, Olivier, Chen, Chao, Zhang, Jun, and Xiang, Yang (2018) Anomaly-based insider threat detection using deep autoencoders. In: Proceedings of the IEEE International Conference on Data Mining Workshops. pp. 39-48. From: ICDMW 2018: IEEE International Conference on Data Mining Workshops, 17-20 November 2018, Singapore.

Liu, Shigang, Wang, Yu, Zhang, Jun, Chen, Chao, and Xiang, Yang (2017) Addressing the class imbalance problem in twitter spam detection using ensemble learning. Computers & Security, 69. pp. 35-49.

Chen, Chao, Wen, Sheng, Zhang, Jun, Xiang, Yang, Oliver, Jonathan, Alelaiwi, Abdulhameed, and Hassan, Mohammad Mehedi (2017) Investigating the deceptive information in twitter spam. Future Generation Computer Systems, 72. pp. 319-326.

Chen, Chao, Wang, Yu, Zhang, Jun, Xiang, Yang, Zhou, Wanlei, and Min, Geyong (2017) Statistical features-based real-tme detection of drifted Twitter spam. IEEE Transactions on Information Forensics and Security, 12 (4). pp. 914-925.

Xie, Bailin, Wang, Yu, Chen, Chao, and Xiang, Yang (2016) Gatekeeping behavior analysis for information credibility assessment on Weibo. In: Lecture Notes in Computer Science (9955) pp. 483-496. From: NSS 2016: 10th International Conference on Network and System Security, 28-30 September 2016, Taipei, Taiwan.

Chen, Chao, Zhang, Jun, Xiang, Yang, Zhou, Wanlei, and Oliver, Jonathan (2016) Spammers are becoming "smarter" on Twitter. IT Professional, 18 (2). pp. 66-70.

Liu, Shigang, Wang, Yu, Chen, Chao, and Xiang, Yang (2016) An ensemble learning approach for addressing the class imbalance problem in twitter spam detection. In: Lecture Notes in Computer Science (9722) pp. 215-228. From: ACISP 2016: 21st Australasian Conference on Information Security and Privacy, 4-6 July 2016, Melbourne, VIC, Australia.

Chen, Chao, Zhang, Jun, Chen, Xiao, Xiang, Yang, and Zhou, Wanlei (2015) 6 million spam tweets: a large ground truth for timely Twitter spam detection. In: Proceedings of the IEEE International Conference on Communications. pp. 7065-7070. From: ICC 2015: IEEE International Conference on Communications, 8-12 June 2015, London, UK.

Chen, Chao, Zhang, Jun, Xiang, Yang, and Zhou, Wanlei (2015) Asymmetric self-learning for tackling Twitter spam drift. In: Proceedings of the IEEE Conference on Computer Communications Workshops. pp. 208-213. From: INFOCOM WKSHPS 2015: IEEE Conference on Computer Communications Workshops, 26 April - 1 May 2015, Hong Kong.

Wang, Yu, Chen, Chao, and Xiang, Yang (2015) Unknown pattern extraction for statistical network protocol identification. In: Proceedings of the IEEE Conference on Local Computer Networks. pp. 506-509. From: LCN 2015: 40th IEEE Conference on Local Computer Networks, 26-29 October 2016, Clearwater Beach, FL, USA.

Chen, Chao, Zhang, Jun, Xie, Yi, Xiang, Yang, Zhou, Wanlei, Hassan, Mohammad Mehedi, AlElaiwi, Abdulhameed, and Alrubaian, Majed (2015) A performance evaluation of machine learning-based streaming spam tweets detection. IEEE Transactions on Computational Social Systems, 2 (3). pp. 65-76.

Wen, Sheng, Haghighi, Mohammad Sayad, Chen, Chao, Xiang, Yang, Zhou, Wanlei, and Jia, Weijia (2015) A sword with two edges: propagation studies on both positive and negative information in online social networks. IEEE Transactions on Computers, 64. pp. 640-653.

Wu, Di, Chen, Xiao, Chen, Chao, Zhang, Jun, Xiang, Yang, and Zhou, Wanlei (2014) On addressing the imbalance problem: a correlated KNN approach for network traffic classification. In: Lecture Notes in Computer Science (8792) pp. 138-151. From: NSS 2014: 8th International Conference on Network and System Security, 15-17 October 2014, Xi'an, China.

This list was generated on Fri Oct 30 02:52:28 2020 AEST.