Остановите войну!
for scientists:
default search action
Chao Chen 0015
Person information
- affiliation: Swinburne University of Technology, School of Software and Electrical Engineering, Hawthorn, VIC, Australia
- affiliation (former): Deakin University, Geelong, Australia
Other persons with the same name
- Chao Chen — disambiguation page
- Chao Chen 0001 — Indiana University - Purdue University Fort Wayne, Department of Engineering, IN, USA
- Chao Chen 0002 — Chinese Academy of Sciences, Key Laboratory of Electromagnetic Radiation and Sensing Technology, Beijing, China
- Chao Chen 0003 — Freescale Semiconductor, Inc., Austin, TX, USA (and 1 more)
- Chao Chen 0004 — Chongqing University, College of Computer Science, China (and 4 more)
- Chao Chen 0005 — Zhejiang Gongshang University, School of Information and Electronic Engineering, Hangzhou, China (and 1 more)
- Chao Chen 0006 — Qualcomm Incorporated, San Diego, CA, USA (and 1 more)
- Chao Chen 0007 — University of Nottingham, School of Computer Science, UK
- Chao Chen 0008 — North Carolina State University, Raleigh, NC, USA (and 2 more)
- Chao Chen 0009 — Harbin Institute of Technology, State Key Laboratory of Robotics and System, China
- Chao Chen 0010 — Shandong Normal University, School of Management Science and Engineering, China
- Chao Chen 0011 — University of Warwick, Coventry, UK
- Chao Chen 0012 — Stony Brook University, Stony Brook, NY, USA
- Chao Chen 0013 — Xidian University, Xi'an, China
- Chao Chen 0014 — University of Miami, Coral Gables, FL, USA
- Chao Chen 0016 — Shanghai Jiao Tong University, China (and 2 more)
- Chao Chen 0017 — National University of Defense Technology, College of System Engineering, Changsha, China
- Chao Chen 0018 — Southeast University, National ASIC Research Center, Nanjing, China
- Chao Chen 0019 — Butterfly Network Inc., Guilford, CT, USA (and 1 more)
- Chao Chen 0020 — University of Florida, Department of Computer and Information Sciences and Engineering, Gainesville, FL, USA
- Chao Chen 0021 — Fortiss GmbH, affiliated institute of Technische Universität München, Munich, Germany
- Chao Chen 0022 — Shenzhen Institutes of Advanced Technology (SIAT), CAS, China
- Chao Chen 0023 — Delft University of Technology, Faculty of Technology, Policy and Management, The Netherlands (and 1 more)
- Chao Chen 0024 — Georgia Institute of Technology, Atlanta, GA, USA
- Chao Chen 0025 — Beihang University, Beijing, China
- Chao Chen 0026 — DAMO Academy, Alibaba Group, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Xinbo Ban, Ming Ding, Shigang Liu, Chao Chen, Jun Zhang:
IoTFuzz: Automated Discovery of Violations in Smart Homes With Real Environment. IEEE Internet Things J. 11(6): 10183-10196 (2024) - [e4]Dan Dongseong Kim, Chao Chen:
Machine Learning for Cyber Security - 5th International Conference, ML4CS 2023, Yanuca Island, Fiji, December 4-6, 2023, Proceedings. Lecture Notes in Computer Science 14541, Springer 2024, ISBN 978-981-97-2457-4 [contents] - 2023
- [j25]Jingjin Li, Chao Chen, Mostafa Rahimi Azghadi, Hossein Ghodosi, Lei Pan, Jun Zhang:
Security and privacy problems in voice assistant applications: A survey. Comput. Secur. 134: 103448 (2023) - [j24]Lin Li, Chao Chen, Lei Pan, Leo Yu Zhang, Zhifeng Wang, Jun Zhang, Yang Xiang:
A Survey of PPG's Application in Authentication. Comput. Secur. 135: 103488 (2023) - [j23]Xiaoyu Zhang, Chao Chen, Yi Xie, Xiaofeng Chen, Jun Zhang, Yang Xiang:
A survey on privacy inference attacks and defenses in cloud-based Deep Neural Network. Comput. Stand. Interfaces 83: 103672 (2023) - [j22]Huacheng Li, Chunhe Xia, Tianbo Wang, Sheng Wen, Chao Chen, Yang Xiang:
Capturing Dynamics of Information Diffusion in SNS: A Survey of Methodology and Techniques. ACM Comput. Surv. 55(2): 22:1-22:51 (2023) - [j21]Gaolei Fei, Yong Cheng, Wanlun Ma, Chao Chen, Sheng Wen, Guangmin Hu:
Real-Time Detection of COVID-19 Events From Twitter: A Spatial-Temporally Bursty-Aware Method. IEEE Trans. Comput. Soc. Syst. 10(2): 656-672 (2023) - [j20]Chuan Xu, Yingyi Ding, Chao Chen, Yong Ding, Wei Zhou, Sheng Wen:
Personalized Location Privacy Protection for Location-Based Services in Vehicular Networks. IEEE Trans. Intell. Transp. Syst. 24(1): 1163-1177 (2023) - [c24]Zian Liu, Chao Chen, Ejaz Ahmed, Jun Zhang, Dongxi Liu:
WinkFuzz: Model-based Script Synthesis for Fuzzing. ASSS@AsiaCCS 2023: 2:1-2:12 - [c23]Lin Li, Chao Chen, Lei Pan, Yonghang Tai, Jun Zhang, Yang Xiang:
Hiding Your Signals: A Security Analysis of PPG-Based Biometric Authentication. ESORICS (3) 2023: 183-202 - [c22]Lin Li, Chao Chen, Lei Pan, Jun Zhang, Yang Xiang:
SigD: A Cross-Session Dataset for PPG-based User Authentication in Different Demographic Groups. IJCNN 2023: 1-8 - [c21]Lin Li, Chao Chen, Lei Pan, Leo Yu Zhang, Jun Zhang, Yang Xiang:
SigA: rPPG-based Authentication for Virtual Reality Head-mounted Display. RAID 2023: 686-699 - [e3]Moti Yung, Chao Chen, Weizhi Meng:
Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings. Lecture Notes in Computer Science 14299, Springer 2023, ISBN 978-3-031-45932-0 [contents] - [i10]Zian Liu, Lei Pan, Chao Chen, Ejaz Ahmed, Shigang Liu, Jun Zhang, Dongxi Liu:
VulMatch: Binary-level Vulnerability Detection Through Signature. CoRR abs/2308.00288 (2023) - 2022
- [j19]Xiangyu Hu, Wanlun Ma, Chao Chen, Sheng Wen, Jun Zhang, Yang Xiang, Gaolei Fei:
Event detection in online social network: Methodologies, state-of-art, and evolution. Comput. Sci. Rev. 46: 100500 (2022) - [j18]Yuantian Miao, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, Yang Xiang:
Machine Learning-based Cyber Attacks Targeting on Controlled Information: A Survey. ACM Comput. Surv. 54(7): 139:1-139:36 (2022) - [j17]Jun Zhang, Lei Pan, Qing-Long Han, Chao Chen, Sheng Wen, Yang Xiang:
Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey. IEEE CAA J. Autom. Sinica 9(3): 377-391 (2022) - [j16]Wanlun Ma, Xiangyu Hu, Chao Chen, Sheng Wen, Kim-Kwang Raymond Choo, Yang Xiang:
Social Media Event Prediction using DNN with Feedback Mechanism. ACM Trans. Manag. Inf. Syst. 13(3): 33:1-33:24 (2022) - [c20]Lin Li, Chao Chen, Lei Pan, Jun Zhang, Yang Xiang:
Video is All You Need: Attacking PPG-based Biometric Authentication. AISec@CCS 2022: 57-66 - [c19]Zian Liu, Chao Chen, Leo Yu Zhang, Shang Gao:
Working Mechanism of Eternalblue and Its Application in Ransomworm. CSS 2022: 178-191 - [c18]Yuantian Miao, Chao Chen, Lei Pan, Shigang Liu, Seyit Camtepe, Jun Zhang, Yang Xiang:
No-Label User-Level Membership Inference for ASR Model Auditing. ESORICS (2) 2022: 610-628 - [c17]Zian Liu, Chao Chen, Ejaz Ahmed, Dongxi Liu, Jun Zhang:
Automated Binary Analysis: A Survey. ICA3PP 2022: 392-411 - [c16]Xinbo Ban, Ming Ding, Shigang Liu, Chao Chen, Jun Zhang:
A Survey on IoT Vulnerability Discovery. NSS 2022: 267-282 - [i9]Lin Li, Chao Chen, Lei Pan, Jun Zhang, Yang Xiang:
SoK: An Overview of PPG's Application in Authentication. CoRR abs/2201.11291 (2022) - [i8]Yuantian Miao, Chao Chen, Lei Pan, Jun Zhang, Yang Xiang:
FAAG: Fast Adversarial Audio Generation through Interactive Attack Optimisation. CoRR abs/2202.05416 (2022) - [i7]Lin Li, Chao Chen, Lei Pan, Jun Zhang, Yang Xiang:
Video is All You Need: Attacking PPG-based Biometric Authentication. CoRR abs/2203.00928 (2022) - [i6]Lin Li, Chao Chen, Lei Pan, Yonghang Tai, Jun Zhang, Yang Xiang:
Hiding Your Signals: A Security Analysis of PPG-based Biometric Authentication. CoRR abs/2207.04434 (2022) - 2021
- [j15]Yuantian Miao, Minhui Xue, Chao Chen, Lei Pan, Jun Zhang, Benjamin Zi Hao Zhao, Dali Kaafar, Yang Xiang:
The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services. Proc. Priv. Enhancing Technol. 2021(1): 209-228 (2021) - [c15]Xinbo Ban, Ming Ding, Shigang Liu, Chao Chen, Jun Zhang, Yang Xiang:
TAESim: A Testbed for IoT Security Analysis of Trigger-Action Environment. CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 218-237 - [e2]Min Yang, Chao Chen, Yang Liu:
Network and System Security - 15th International Conference, NSS 2021, Tianjin, China, October 23, 2021, Proceedings. Lecture Notes in Computer Science 13041, Springer 2021, ISBN 978-3-030-92707-3 [contents] - [i5]Yuantian Miao, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, Yang Xiang:
Machine Learning Based Cyber Attacks Targeting on Controlled Information: A Survey. CoRR abs/2102.07969 (2021) - [i4]Xiaoyu Zhang, Chao Chen, Yi Xie, Xiaofeng Chen, Jun Zhang, Yang Xiang:
Privacy Inference Attacks and Defenses in Cloud-based Deep Neural Network: A Survey. CoRR abs/2105.06300 (2021) - [i3]Ning Xi, Chao Chen, Jun Zhang, Cong Sun, Shigang Liu, Pengbin Feng, Jianfeng Ma:
Information flow based defensive chain for data leakage detection and prevention: a survey. CoRR abs/2106.04951 (2021) - [i2]Huacheng Li, Chunhe Xia, Tianbo Wang, Sheng Wen, Chao Chen, Yang Xiang:
Capturing Dynamics of Information Diffusion in SNS: A Survey of Methodology and Techniques. CoRR abs/2110.14245 (2021) - 2020
- [j14]Shigang Liu, Mahdi Dibaei, Yonghang Tai, Chao Chen, Jun Zhang, Yang Xiang:
Cyber Vulnerability Intelligence for Internet of Things Binary. IEEE Trans. Ind. Informatics 16(3): 2154-2163 (2020) - [c14]Liu Liu, Chao Chen, Jun Zhang, Olivier Y. de Vel, Yang Xiang:
Doc2vec-based Insider Threat Detection through Behaviour Analysis of Multi-source Security Logs. TrustCom 2020: 301-309 - [e1]Miroslaw Kutylowski, Jun Zhang, Chao Chen:
Network and System Security - 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25-27, 2020, Proceedings. Lecture Notes in Computer Science 12570, Springer 2020, ISBN 978-3-030-65744-4 [contents]
2010 – 2019
- 2019
- [j13]Liu Liu, Chao Chen, Jun Zhang, Olivier Y. de Vel, Yang Xiang:
Insider Threat Identification Using the Simultaneous Neural Learning of Multi-Source Logs. IEEE Access 7: 183162-183176 (2019) - [j12]Xinbo Ban, Shigang Liu, Chao Chen, Caslon Chua:
A performance evaluation of deep-learnt features for software vulnerability detection. Concurr. Comput. Pract. Exp. 31(19) (2019) - [c13]Liu Liu, Chao Chen, Jun Zhang, Olivier Y. de Vel, Yang Xiang:
Unsupervised Insider Detection Through Neural Feature Learning and Model Optimisation. NSS 2019: 18-36 - [c12]Zian Liu, Chao Chen, Shigang Liu, Dongxi Liu, Yu Wang:
Exploit in Smart Devices: A Case Study. SocialSec 2019: 152-164 - [i1]Yuantian Miao, Benjamin Zi Hao Zhao, Minhui Xue, Chao Chen, Lei Pan, Jun Zhang, Dali Kaafar, Yang Xiang:
The Audio Auditor: Participant-Level Membership Inference in Voice-Based IoT. CoRR abs/1905.07082 (2019) - 2018
- [c11]Liu Liu, Olivier Y. de Vel, Chao Chen, Jun Zhang, Yang Xiang:
Anomaly-Based Insider Threat Detection Using Deep Autoencoders. ICDM Workshops 2018: 39-48 - [c10]Xinbo Ban, Chao Chen, Shigang Liu, Yu Wang, Jun Zhang:
Deep-learnt features for Twitter spam detection. SocialSec 2018: 22-26 - 2017
- [j11]Shigang Liu, Yu Wang, Jun Zhang, Chao Chen, Yang Xiang:
Addressing the class imbalance problem in Twitter spam detection using ensemble learning. Comput. Secur. 69: 35-49 (2017) - [j10]Chao Chen, Sheng Wen, Jun Zhang, Yang Xiang, Jonathan J. Oliver, Abdulhameed Alelaiwi, Mohammad Mehedi Hassan:
Investigating the deceptive information in Twitter spam. Future Gener. Comput. Syst. 72: 319-326 (2017) - [j9]Chao Chen, Yu Wang, Jun Zhang, Yang Xiang, Wanlei Zhou, Geyong Min:
Statistical Features-Based Real-Time Detection of Drifted Twitter Spam. IEEE Trans. Inf. Forensics Secur. 12(4): 914-925 (2017) - 2016
- [j8]Chao Chen, Jun Zhang, Yang Xiang, Wanlei Zhou, Jonathan J. Oliver:
Spammers Are Becoming "Smarter" on Twitter. IT Prof. 18(2): 66-70 (2016) - [j7]Chao Chen, Jun Zhang, Yi Xie, Yang Xiang, Wanlei Zhou, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi:
Comments and Corrections. IEEE Trans. Comput. Soc. Syst. 3(1): 42 (2016) - [c9]Shigang Liu, Yu Wang, Chao Chen, Yang Xiang:
An Ensemble Learning Approach for Addressing the Class Imbalance Problem in Twitter Spam Detection. ACISP (1) 2016: 215-228 - [c8]Bailin Xie, Yu Wang, Chao Chen, Yang Xiang:
Gatekeeping Behavior Analysis for Information Credibility Assessment on Weibo. NSS 2016: 483-496 - 2015
- [j6]Sheng Wen, Mohammad Sayad Haghighi, Chao Chen, Yang Xiang, Wanlei Zhou, Weijia Jia:
A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks. IEEE Trans. Computers 64(3): 640-653 (2015) - [j5]Xiaomin Zhu, Chao Chen, Laurence T. Yang, Yang Xiang:
ANGEL: Agent-Based Scheduling for Real-Time Tasks in Virtualized Clouds. IEEE Trans. Computers 64(12): 3389-3403 (2015) - [j4]Chao Chen, Jun Zhang, Yi Xie, Yang Xiang, Wanlei Zhou, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi, Majed A. AlRubaian:
A Performance Evaluation of Machine Learning-Based Streaming Spam Tweets Detection. IEEE Trans. Comput. Soc. Syst. 2(3): 65-76 (2015) - [c7]Chao Chen, Jun Zhang, Xiao Chen, Yang Xiang, Wanlei Zhou:
6 million spam tweets: A large ground truth for timely Twitter spam detection. ICC 2015: 7065-7070 - [c6]Chao Chen, Jun Zhang, Yang Xiang, Wanlei Zhou:
Asymmetric self-learning for tackling Twitter Spam Drift. INFOCOM Workshops 2015: 208-213 - [c5]Yu Wang, Chao Chen, Yang Xiang:
Unknown pattern extraction for statistical network protocol identification. LCN 2015: 506-509 - 2014
- [c4]Di Wu, Xiao Chen, Chao Chen, Jun Zhang, Yang Xiang, Wanlei Zhou:
On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classification. NSS 2014: 138-151 - 2013
- [j3]Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou, Yong Xiang:
Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions. IEEE Trans. Inf. Forensics Secur. 8(1): 5-15 (2013) - [j2]Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou, Athanasios V. Vasilakos:
An Effective Network Traffic Classification Method with Unknown Flow Detection. IEEE Trans. Netw. Serv. Manag. 10(2): 133-147 (2013) - [c3]Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou:
Robust network traffic identification with unknown applications. AsiaCCS 2013: 405-414 - 2012
- [j1]Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou:
Semi-supervised and compound classification of network traffic. Int. J. Secur. Networks 7(4): 252-261 (2012) - [c2]Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou:
Semi-supervised and Compound Classification of Network Traffic. ICDCS Workshops 2012: 617-621 - [c1]Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou:
Classification of Correlated Internet Traffic Flows. TrustCom 2012: 490-496
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 03:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint