Chao Chen
Title
Cited by
Cited by
Year
Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions
J Zhang, C Chen, Y Xiang, W Zhou
IEEE Transactions on Information Forensics and Security 8 (1), 5-15, 2013
1732013
A sword with two edges: Propagation studies on both positive and negative information in online social networks
S Wen, M Haghighi, C Chen, Y Xiang, W Zhou, W Jia
IEEE Transactions on Computers 64 (3), 640-653, 2014
1362014
An Effective Network Traffic Classification Method with Unknown Flow Detection
J Zhang, C Chen, Y Xiang, W Zhou, A Vasilakos
IEEE Transactions on Network and Service Management 10 (2), 133-147, 2013
1092013
Statistical Features Based Real-time Detection of Drifted Twitter Spam
C Chen, Y Wang, J Zhang, Y Xiang, W Zhou, GY Min
IEEE Transactions on Information Forensics and Security 12 (4), 914 - 925, 2017
1072017
6 million spam tweets: A large ground truth for timely Twitter spam detection
C Chen, J Zhang, X Chen, Y Xiang, W Zhou
2015 IEEE International Conference on Communications (ICC), 7065-7070, 2015
1072015
A Performance Evaluation of Machine Learning-Based Streaming Spam Tweets Detection
C Chen, J Zhang, Y Xie, Y Xiang, W Zhou, MM Hassan, A AlElaiwi, ...
IEEE Transactions on Computational Social Systems 2 (3), 65-76, 2016
862016
Addressing the class imbalance problem in twitter spam detection using ensemble learning
S Liu, Y Wang, J Zhang, C Chen, Y Xiang
Computers & Security 69, 35-49, 2017
632017
Investigating the deceptive information in twitter spam
C Chen, S Wen, J Zhang, Y Xiang, J Oliver, A Alelaiwi, MM Hassan
Future Generation Computer Systems 72, 319-326, 2017
482017
Spammers Are Becoming "Smarter" on Twitter
C Chen, J Zhang, Y Xiang, W Zhou, J Oliver
IT Professional 18 (2), 66-70, 2016
372016
Asymmetric self-learning for tackling twitter spam drift
C Chen, J Zhang, Y Xiang, W Zhou
2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2015
352015
An in-depth analysis of abuse on twitter
J Oliver, P Pajares, C Ke, C Chen, Y Xiang
Trend Micro 225, 1-22, 2014
322014
Robust network traffic identification with unknown applications
J Zhang, C Chen, Y Xiang, W Zhou
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
222013
Anomaly-Based Insider Threat Detection Using Deep Autoencoders
L Liu, O De Vel, C Chen, J Zhang, Y Xiang
2018 IEEE International Conference on Data Mining Workshops (ICDMW), 39-48, 2018
192018
Semi-supervised and Compound Classification of Network Traffic
J Zhang, C Chen, Y Xiang, W Zhou
Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International …, 2012
192012
Semi-supervised and compound classification of network traffic
J Zhang, C Chen, Y Xiang, W Zhou
International Journal of Security and Networks 7 (4), 252-261, 2012
192012
A performance evaluation of deep‐learnt features for software vulnerability detection
X Ban, S Liu, C Chen, C Chua
Concurrency and Computation: Practice and Experience 31 (19), 2019
142019
Cyber Vulnerability Intelligence for IoT Binary
S Liu, M Dibaei, Y Tai, C Chen, J Zhang, Y Xiang
IEEE Transactions on Industrial Informatics 3 (16), 2154 - 2163, 2020
13*2020
Insider threat identification using the simultaneous neural learning of multi-source logs
L Liu, C Chen, J Zhang, O De Vel, Y Xiang
IEEE Access 7, 183162-183176, 2019
132019
On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classification
D Wu, X Chen, C Chen, J Zhang, Y Xiang, W Zhou
International Conference on Network and System Security, 138-151, 2014
132014
An ensemble learning approach for addressing the class imbalance problem in twitter spam detection
S Liu, Y Wang, C Chen, Y Xiang
Australasian Conference on Information Security and Privacy, 215-228, 2016
112016
The system can't perform the operation now. Try again later.
Articles 1–20