Automatic ransomware detection and analysis based on dynamic API calls flow graph ZG Chen, HS Kang, SN Yin, SR Kim Proceedings of the international conference on research in adaptive and …, 2017 | 136 | 2017 |
An efficient privacy protection in mobility social network services with novel clustering-based anonymization ZG Chen, HS Kang, SN Yin, SR Kim EURASIP journal on Wireless communications and networking 2016, 1-9, 2016 | 14 | 2016 |
An efficient boosting-based windows malware family classification system using multi-features fusion Z Chen, X Ren Applied Sciences 13 (6), 4060, 2023 | 13 | 2023 |
The effects of audiovisual landmarks on spatial learning and recalling for image browsing interface in virtual environments BY Gao, Z Chen, X Chen, H Tu, F Huang Journal of Systems Architecture 117, 102096, 2021 | 10 | 2021 |
A learning-based static malware detection system with integrated feature Z Chen, X Zhang, S Kim Intell. Autom. Soft Comput 27 (3), 891-908, 2021 | 8 | 2021 |
Intrusion detection system based on complex event processing in RFID middleware SN Yin, HS Kang, ZG Chen, SR Kim Proceedings of the International Conference on Research in Adaptive and …, 2016 | 8 | 2016 |
Combining principal component analysis, decision tree and naïve Bayesian algorithm for adaptive intrusion detection ZG Chen, SR Kim Proceedings of the 2013 Research in Adaptive and Convergent Systems, 312-316, 2013 | 7 | 2013 |
Efficient Windows malware identification and classification scheme for plant protection information systems Z Chen, S Xing, X Ren Frontiers in Plant Science 14, 1123696, 2023 | 6 | 2023 |
Hyperspectral image super-resolution method based on spectral smoothing prior and tensor tubal row-sparse representation L Sun, Q Cheng, Z Chen Remote Sensing 14 (9), 2142, 2022 | 6 | 2022 |
VMCTE: Visualization-Based Malware Classification Using Transfer and Ensemble Learning Z Chen, J Cao Computers, Materials & Continua 75 (2), 4445-4465, 2023 | 4 | 2023 |
Design of a New Efficient Hybrid System for Intrusion Detection Based on HSM Fuzzy Decision Tree ZG Chen, HS Kang, SR Kim 網際網路技術學刊 16 (5), 885-891, 2015 | 4 | 2015 |
LDFGB algorithm for anomaly intrusion detection S Yin, Z Chen, SR Kim Information and Communication Technology: Second IFIP TC5/8 International …, 2014 | 4 | 2014 |
SaaS application mashup based on High Speed Message Processing Z Chen, M Kim, Y Cui KSII Transactions on Internet and Information Systems (TIIS) 16 (5), 1446-1465, 2022 | 2 | 2022 |
A malware detection system based on heterogeneous information network SN Yin, HS Kang, ZG Chen, SR Kim Proceedings of the 2018 Conference on Research in Adaptive and Convergent …, 2018 | 2 | 2018 |
Global video object segmentation with spatial constraint module Y Chen, D Wang, Z Chen, ZX Yang, E Wu Computational Visual Media 9 (2), 385-400, 2023 | 1 | 2023 |
A Hybrid System for Reducing Memory and Time Overhead of Intrusion Detection System ZG Chen, SR Kim Information and Communication Technology: Second IFIP TC5/8 International …, 2014 | 1 | 2014 |
A Distributed Real-Time Monitoring Scheme for Air Pressure Stream Data Based on Kafka Z Zhou, L Zhou, Z Chen Applied Sciences 14 (12), 4967, 2024 | | 2024 |