A bigram based real time DNS tunnel detection approach C Qi, X Chen, C Xu, J Shi, P Liu Procedia Computer Science 17, 852-860, 2013 | 78 | 2013 |
A survey on collaborative deep learning and privacy-preserving D Zhang, X Chen, D Wang, J Shi 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC …, 2018 | 76 | 2018 |
Eastfly: Efficient and secure ternary federated learning Y Dong, X Chen, L Shen, D Wang Computers & Security 94, 101824, 2020 | 73 | 2020 |
Defeat: Deep hidden feature backdoor attacks by imperceptible perturbation and latent representation constraints Z Zhao, X Chen, Y Xuan, Y Dong, D Wang, K Liang Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022 | 48 | 2022 |
Inferring attack intent of malicious insider based on probabilistic attack graph model XJ Chen, BX Fang, QF Tan, H Zhang Chinese Journal of Computers 37 (1), 62-72, 2014 | 42 | 2014 |
: Oblivious Defender for Private Byzantine-Robust Federated Learning with Dishonest-Majority Y Dong, X Chen, K Li, D Wang, S Zeng European Symposium on Research in Computer Security, 497-518, 2021 | 38 | 2021 |
Privacy-preserving distributed machine learning based on secret sharing Y Dong, X Chen, L Shen, D Wang Information and Communications Security: 21st International Conference …, 2020 | 24 | 2020 |
A multi-level analysis framework in network security situation awareness H Zhang, J Shi, X Chen Procedia Computer Science 17, 530-536, 2013 | 24 | 2013 |
Efficient and secure federated learning based on secret sharing and gradients selection Y Dong, W Hou, X Chen, S Zeng Journal of Computer Research and Development 57 (10), 2241-2250, 2020 | 20 | 2020 |
Detecting insider threat based on document access behavior analysis R Zhang, X Chen, J Shi, F Xu, Y Pu Web Technologies and Applications: APWeb 2014 Workshops, SNA, NIS, and IoTS …, 2014 | 20 | 2014 |
Survey on automatic text summarization J Li, C Zhang, X Chen, Y Hu, P Liao J. Comput. Res. Dev 58, 1-21, 2021 | 19 | 2021 |
Clts: A new chinese long text summarization dataset X Liu, C Zhang, X Chen, Y Cao, J Li CCF International Conference on Natural Language Processing and Chinese …, 2020 | 18 | 2020 |
Implementation and evaluation of different parallel designs of AES using CUDA J Ma, X Chen, R Xu, J Shi 2017 IEEE second international conference on data science in cyberspace (DSC …, 2017 | 18 | 2017 |
Abstractive text summarization with multi-head attention J Li, C Zhang, X Chen, Y Cao, P Liao, P Zhang 2019 international joint conference on neural networks (ijcnn), 1-8, 2019 | 15 | 2019 |
Efficient and private set intersection of human genomes L Shen, X Chen, D Wang, B Fang, Y Dong 2018 IEEE International Conference on Bioinformatics and Biomedicine (BIBM …, 2018 | 15 | 2018 |
A multiple watermarking algorithm for texts mixed Chinese and English X Rui, C XiaoJun, S Jinqiao Procedia Computer Science 17, 844-851, 2013 | 13 | 2013 |
An efficient 3-party framework for privacy-preserving neural network inference L Shen, X Chen, J Shi, Y Dong, B Fang European Symposium on Research in Computer Security, 419-439, 2020 | 12 | 2020 |
Data stolen trojan detection based on network behaviors Y Pu, X Chen, X Cui, J Shi, L Guo, C Qi Procedia Computer Science 17, 828-835, 2013 | 12 | 2013 |
A practical real-time authentication system with Identity Tracking based on mouse dynamics X Chen, F Xu, R Xu, SM Yiu, J Shi 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2014 | 11 | 2014 |
Towards misdirected email detection for preventing information leakage T Liu, Y Pu, J Shi, Q Li, X Chen 2014 IEEE Symposium on Computers and Communications (ISCC), 1-6, 2014 | 10 | 2014 |