Publications by: Chao Chen

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0 [feed] RSS 2.0
Number of items: 42.

Zhang, Bonan, Li, Jingjin, Ward, Lindsay, Zhang, Ying, Chen, Chao, Zhang, Jun, and Wang, Ding (2023) Deep Graph Embedding for IoT Botnet Traffic Detection. Security and Communication Networks, 2023. 9796912.

Li, Jingjin, Chen, Chao, Rahimi Azghadi, Mostafa, Ghodosi, Hossein, Pan, Lei, and Zhang, Jun (2023) Security and privacy problems in voice assistant applications: A survey. Computers & Security, 134. 103448.

Zhang, Jun, Pan, Lei, Han, Qing-Long, Chen, Chao, Wen, Sheng, and Xiang, Yang (2022) Deep learning based attack detection for cyber-physical system cybersecurity: a survey. IEEE - CAA Journal of Automatica Sinica, 9 (3). pp. 377-391.

Li, Xiaonan, Ghodosi, Hossein, Chen, Chao, Sankupellay, Mangalam, and Lee, Ickjai (2022) Improving Network-Based Anomaly Detection in Smart Home Environment. Sensors, 22 (15). 5626.

Miao, Yuantian, Chen, Chao, Pan, Lei, Liu, Shigang, Camtepe, Seyit, Zhang, Jun, and Xiang, Yang (2022) No-Label User-Level Membership Inference for ASR Model Auditing. In: Lecture Notes in Computer Science (13555) pp. 610-628. From: ESORICS 2022: 27th European Symposium on Research in Computer Security, 26-30 September 2022, Copenhagen, Denmark.

Xu, Chuan, Ding, Yingyi, Chen, Chao, Ding, Yong, Zhou, Wei, and Wen, Sheng (2022) Personalized Location Privacy Protection for Location-Based Services in Vehicular Networks. IEEE Transactions on Intelligent Transportation Systems, 24 (1). pp. 1163-1177.

Zhang, Bonan, Li, Jingjin, Chen, Chao, Lee, Kyungmi, and Lee, Ickjai (2022) A Practical Botnet Traffic Detection System using GNN. In: Lecture Notes in Computer Science (13172) pp. 66-78. From: CSS 2021: Cyberspace Safety and Security, 9-11 November 2021, Virtual.

Fei, Gaolei, Cheng, Yong, Ma, Wanlun, Chen, Chao, Wen, Sheng, and Hu, Guangmin (2022) Real-Time Detection of COVID-19 Events From Twitter: A Spatial-Temporally Bursty-Aware Method. IEEE Transactions on Computational Social Systems, 10 (2). pp. 656-672.

Ma, Wanlun, Hu, Xiangyu, Chen, Chao, Wen, Sheng, Choo, Kim-Kwang Raymond, and Xiang, Yang (2022) Social media event prediction using DNN with feedback mechanism. ACM Transactions on Management Information Systems, 13 (3). 33.

Ban, Xinbo, Ding, Ming, Liu, Shigang, Chen, Chao, Zhang, Jun, and Xiang, Yang (2022) TAESim: A Testbed for IoT Security Analysis of Trigger-Action Environment. In: Lecture Notes in Computer Science (13106) p. 218. From: ESORICS 2021: European Symposium on Research in Computer Security, 4-8 October 2021, Virtual.

Zhang, Xiaoyu, Chen, Chao, Xie, Yi, Chen, Xiaofeng, Zhang, Jun, and Xiang, Yang (2022) A survey on privacy inference attacks and defenses in cloud-based Deep Neural Network. Computer Standards and Interfaces, 83. 103672.

Li, Huacheng, Xia, Chunhe, Wang, Tianbo, Wen, Sheng, Chen, Chao, and Xiang, Yang (2021) Capturing dynamics of information diffusion in SNS: a survey of methodology and techniques. ACM Computing Surveys, 55 (1). 22.

Miao, Yuantian, Chen, Chao, Pan, Lei, Han, Qing-Long, Zhang, Jun, and Xiang, Yang (2021) Machine learning–based cyber attacks targeting on controlled information: a survey. ACM Computing Surveys, 54 (7). 139. pp. 1-36.

Miao, Yuantian, Minhui, Xue, Chen, Chao, Pan, Lei, Zhang, Jun, Zhao, Benjamin Zi Hao, Kaafar, Dali, and Xiang, Yang (2021) The audio auditor: user-level membership inference in Internet of Things voice services. Proceedings on Privacy Enhancing Technologies, 2021 (1). pp. 209-228.

Liu, Shigang, Dibaei, Mahdi, Tai, Yonghang, Chen, Chao, Zhang, Jun, and Xiang, Yang (2020) Cyber vulnerability intelligence for Internet of Things binary. IEEE Transactions on Industrial Informatics, 16 (3). pp. 2154-2163.

Liu, Liu, Chen, Chao, Zhang, Jun, De Vel, Olivier, and Xiang, Yang (2020) Doc2vec-based insider threat detection through behaviour analysis of multi-source security logs. In: Proceedings of the IEEE 19th International Conference on Trust, Security and Privacy in Computing. pp. 301-309. From: TrustCom 2020: IEEE 19th International Conference on Trust, Security and Privacy in Computing, 29 December 2020 - 1 January 2021, Guangzhou, China.

Ban, Xinbo, Chen, Chao, Liu, Shigang, Wang, Yu, and Zhang, Jun (2019) Deep-learnt features for Twitter spam detection. In: Proceedings of the 2018 International Symposium on Security and Privacy in Social Networks and Big Data. pp. 208-212. From: SocialSec 2018: International Symposium on Security and Privacy in Social Networks and Big Data, 10-11 December 2018, Santa Clara, CA, USA.

Liu, Zian, Chen, Chao, Liu, Shigang, Liu, Dongxi, and Wang, Yu (2019) Exploit in smart devices: a case study. In: Communications in Computer and Information Science (1095) pp. 152-164. From: SocialSec 2019: 5th International Symposium on Security and Privacy in Social Networks and Big Data, 14-17 July 2019, Copenhagen, Denmark.

Liu, Liu, Chen, Chao, Zhang, Jun, De Vel, Olivier, and Xiang, Yang (2019) Insider threat identification using the simultaneous neural learning of multi-source logs. IEEE Access, 7. pp. 183162-183176.

Liu, Liu, Chen, Chao, Zhang, Jun, De Vel, Olivier, and Xiang, Yang (2019) Unsupervised insider detection through neural feature learning and model optimisation. In: Lecture Notes in Computer Science (11928) pp. 18-36. From: NSS 2019: 13th International Conference on Network and System Security, 15-18 December 2019, Sapporo, Japan.

Ban, Xinbo, Liu, Shigang, Chen, Chao, and Chua, Caslon (2019) A performance evaluation of deep-learnt features for software vulnerability detection. Concurrency and Computation: Practice and Experience, 31 (19). e5103.

Liu, Liu, De Vel, Olivier, Chen, Chao, Zhang, Jun, and Xiang, Yang (2018) Anomaly-based insider threat detection using deep autoencoders. In: Proceedings of the IEEE International Conference on Data Mining Workshops. pp. 39-48. From: ICDMW 2018: IEEE International Conference on Data Mining Workshops, 17-20 November 2018, Singapore.

Liu, Shigang, Wang, Yu, Zhang, Jun, Chen, Chao, and Xiang, Yang (2017) Addressing the class imbalance problem in twitter spam detection using ensemble learning. Computers & Security, 69. pp. 35-49.

Chen, Chao, Wen, Sheng, Zhang, Jun, Xiang, Yang, Oliver, Jonathan, Alelaiwi, Abdulhameed, and Hassan, Mohammad Mehedi (2017) Investigating the deceptive information in twitter spam. Future Generation Computer Systems, 72. pp. 319-326.

Chen, Chao, Wang, Yu, Zhang, Jun, Xiang, Yang, Zhou, Wanlei, and Min, Geyong (2017) Statistical features-based real-tme detection of drifted Twitter spam. IEEE Transactions on Information Forensics and Security, 12 (4). pp. 914-925.

Xie, Bailin, Wang, Yu, Chen, Chao, and Xiang, Yang (2016) Gatekeeping behavior analysis for information credibility assessment on Weibo. In: Lecture Notes in Computer Science (9955) pp. 483-496. From: NSS 2016: 10th International Conference on Network and System Security, 28-30 September 2016, Taipei, Taiwan.

Chen, Chao, Cleverly, James, Zhang, Lu, Yu, Qiang, and Eamus, Derek (2016) Modelling Seasonal and Inter-annual Variations in Carbon and Water Fluxes in an Arid-Zone Acacia Savanna Woodland, 1981–2012. Ecosystems, 19. pp. 625-644.

Cleverly, Jamie, Eamus, Derek, Van Gorsel, Eva, Chen, Chao, Rumman, Rizwana, Luo, Qunying, Coupe, Natalia Restrepo, Li, Longhui, Kljun, Natascha, Faux, Ralph, Yu, Qiang, and Huete, Alfredo (2016) Productivity and evapotranspiration of two contrasting semiarid ecosystems following the 2011 global carbon land sink anomaly. Agricultural and Forest Meteorology, 220. pp. 151-159.

Chen, Chao, Zhang, Jun, Xiang, Yang, Zhou, Wanlei, and Oliver, Jonathan (2016) Spammers are becoming "smarter" on Twitter. IT Professional, 18 (2). pp. 66-70.

Liu, Shigang, Wang, Yu, Chen, Chao, and Xiang, Yang (2016) An ensemble learning approach for addressing the class imbalance problem in twitter spam detection. In: Lecture Notes in Computer Science (9722) pp. 215-228. From: ACISP 2016: 21st Australasian Conference on Information Security and Privacy, 4-6 July 2016, Melbourne, VIC, Australia.

Chen, Chao, Zhang, Jun, Chen, Xiao, Xiang, Yang, and Zhou, Wanlei (2015) 6 million spam tweets: a large ground truth for timely Twitter spam detection. In: Proceedings of the IEEE International Conference on Communications. pp. 7065-7070. From: ICC 2015: IEEE International Conference on Communications, 8-12 June 2015, London, UK.

Chen, Chao, Zhang, Jun, Xiang, Yang, and Zhou, Wanlei (2015) Asymmetric self-learning for tackling Twitter spam drift. In: Proceedings of the IEEE Conference on Computer Communications Workshops. pp. 208-213. From: INFOCOM WKSHPS 2015: IEEE Conference on Computer Communications Workshops, 26 April - 1 May 2015, Hong Kong.

Wang, Yu, Chen, Chao, and Xiang, Yang (2015) Unknown pattern extraction for statistical network protocol identification. In: Proceedings of the IEEE Conference on Local Computer Networks. pp. 506-509. From: LCN 2015: 40th IEEE Conference on Local Computer Networks, 26-29 October 2016, Clearwater Beach, FL, USA.

Chen, Chao, Zhang, Jun, Xie, Yi, Xiang, Yang, Zhou, Wanlei, Hassan, Mohammad Mehedi, AlElaiwi, Abdulhameed, and Alrubaian, Majed (2015) A performance evaluation of machine learning-based streaming spam tweets detection. IEEE Transactions on Computational Social Systems, 2 (3). pp. 65-76.

Wen, Sheng, Haghighi, Mohammad Sayad, Chen, Chao, Xiang, Yang, Zhou, Wanlei, and Jia, Weijia (2015) A sword with two edges: propagation studies on both positive and negative information in online social networks. IEEE Transactions on Computers, 64. pp. 640-653.

Wu, Di, Chen, Xiao, Chen, Chao, Zhang, Jun, Xiang, Yang, and Zhou, Wanlei (2014) On addressing the imbalance problem: a correlated KNN approach for network traffic classification. In: Lecture Notes in Computer Science (8792) pp. 138-151. From: NSS 2014: 8th International Conference on Network and System Security, 15-17 October 2014, Xi'an, China.

Zhang, Jun, Chen, Chao, Xiang, Yang, Zhou, Wanlei, and Xiang, Yong (2013) Internet traffic classification by aggregating correlated naive Bayes predictions. IEEE Transactions on Information Forensics and Security, 8 (1). pp. 5-15.

Zhang, Jun, Chen, Chao, Xiang, Yang, and Zhou, Wanlei (2013) Robust network traffic identification with unknown applications. In: Proceedings of the 8th ACM SIGSAC symposium on Information, Computer and Communications Security. pp. 405-414. From: ASIA CCS 2013: 8th ACM SIGSAC symposium on Information, Computer and Communications Security, 8-10 May 2013, Hanzhou, China.

Zhang, Jun, Chen, Chao, Xiang, Yang, and Zhou, Wanlei (2013) Semi-supervised and compound classification of network traffic. In: International Conference on Distributed Computing Systems Workshops. pp. 617-621. From: 2012 32nd International Conference on Distributed Computing Systems Workshops, 18-21 June 2012, Macau, China.

Zhang, Jun, Chen, Chao, Xiang, Yang, Zhou, Wanlei, and Vasilakos, Athanasios V. (2013) An effective network traffic classification method with unknown flow detection. IEEE Transactions on Network and Service Management, 10 (2). pp. 133-147.

Zhang, Jun, Chen, Chao, Xiang, Yang, and Zhou, Wanlei (2012) Classification of correlated Internet traffic flows. In: Proceedings of the 11th International Conference on Trust, Security and Privacy in Computing and Communications. pp. 490-496. From: TrustCom 2012: IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 25-27 June 2012, Liverpool, UK.

Zhang, Jun, Chen, Chao, Xiang, Yang, and Zhou, Wanlei (2012) Semi-supervised and compound classification of network traffic. In: Proceedings of the 32nd Internation Conference on Distributed Computing Systems Workshops. pp. 617-621. From: ICDCSW 2012: 32nd International Conference on Distributed Computing Systems Workshops, 18-21 June 2012, Macua, China.

This list was generated on Thu Mar 28 12:57:17 2024 AEST.