Search

Your search keyword '"Kangfeng Zheng"' showing total 102 results

Search Constraints

Start Over You searched for: Author "Kangfeng Zheng" Remove constraint Author: "Kangfeng Zheng" Database OpenAIRE Remove constraint Database: OpenAIRE
102 results on '"Kangfeng Zheng"'

Search Results

2. Prediction of Phishing Susceptibility Based on a Combination of Static and Dynamic Features

3. Supervised Character Resemble Substitution Personality Adversarial Method

5. CBA-CLSVE: A Class-Level Soft-Voting Ensemble Based on the Chaos Bat Algorithm for Intrusion Detection

7. User Authentication Method Based on Keystroke Dynamics and Mouse Dynamics with Scene-Irrelated Features in Hybrid Scenes

8. Detection of compromised accounts for online social networks based on a supervised analytical hierarchy process

9. Simulation Design for Security Testing of Integrated Electronic Systems

10. AATMS: An Anti-Attack Trust Management Scheme in VANET

11. Strategy Selection for Moving Target Defense in Incomplete Information Game

12. Using Improved Conditional Generative Adversarial Networks to Detect Social Bots on Twitter

13. Network Intrusion Detection Based on Supervised Adversarial Variational Auto-Encoder With Regularization

14. An Explainable Machine Learning Framework for Intrusion Detection Systems

15. Personality Privacy Protection Method of Social Users Based on Generative Adversarial Networks

17. Predicting User Susceptibility to Phishing Based on Multidimensional Features

18. Phishing Website Detection Based on Deep Convolutional Neural Network and Random Forest Ensemble Learning

19. Personality Classification of Social Users Based on Feature Fusion

20. Adversarial Text Generation for Personality Privacy Protection

21. Feature subset selection combining maximal information entropy and maximal information coefficient

22. Survey on blockchain for Internet of Things

23. Improving Reliability: User Authentication on Smartphones Using Keystroke Biometrics

24. Efficient Strategy Selection for Moving Target Defense Under Multiple Attacks

25. SMOTETomek-Based Resampling for Personality Recognition

26. Game Theoretic Suppression of Forged Messages in Online Social Networks

27. A Session and Dialogue-Based Social Engineering Framework

28. A Forwarding Prediction Model of Social Network based on Heterogeneous Network

29. An Encrypted Traffic Classification Framework Based on Convolutional Neural Networks and Stacked Autoencoders

30. Graph Adaptation Network with Domain-Specific Word Alignment for Cross-Domain Relation Extraction

31. Encoding Text Information with Graph Convolutional Networks for Personality Recognition

32. Hierarchical Transformer Network for Utterance-Level Emotion Recognition

33. User Authentication Method Based on MKL for Keystroke and Mouse Behavioral Feature Fusion

34. Moving Target Defense Against Injection Attacks

35. The Impact of Link Duration on the Integrity of Distributed Mobile Networks

36. User Identification by Keystroke Dynamics Based on Feature Correlation Analysis and Feature optimization

37. Capacity of blockchain based Internet-of-Things: Testbed and analysis

38. Feature selection method with joint maximal information entropy between features and class

39. Elastic Switch Migration for Control Plane Load Balancing in SDN

40. Generating facial expression adversarial examples based on saliency map

41. Adv-Emotion: The Facial Expression Adversarial Attack

42. Detecting Social Media Bots with Variational AutoEncoder and k-Nearest Neighbor

43. Attack and Defence of Ethereum Remote APIs

44. Building an Effective Intrusion Detection System Using the Modified Density Peak Clustering Algorithm and Deep Belief Networks

45. Group-Based Susceptible-Infectious-Susceptible Model in Large-Scale Directed Networks

46. A Neighbor Prototype Selection Method Based on CCHPSO for Intrusion Detection

47. Feature Analysis and Optimisation for Computational Personality Recognition

48. Intrusion detection algorithm based on density, cluster centers, and nearest neighbors

49. Feature Selection Methods in the Framework of mRMR

50. An Earth Mover's Distance Algorithm Based DDoS Detection Mechanism in SDN

Catalog

Books, media, physical & digital resources