Follow
XiaoJun Chen
Title
Cited by
Cited by
Year
A bigram based real time DNS tunnel detection approach
C Qi, X Chen, C Xu, J Shi, P Liu
Procedia Computer Science 17, 852-860, 2013
782013
A survey on collaborative deep learning and privacy-preserving
D Zhang, X Chen, D Wang, J Shi
2018 IEEE Third International Conference on Data Science in Cyberspace (DSC …, 2018
762018
Eastfly: Efficient and secure ternary federated learning
Y Dong, X Chen, L Shen, D Wang
Computers & Security 94, 101824, 2020
732020
Defeat: Deep hidden feature backdoor attacks by imperceptible perturbation and latent representation constraints
Z Zhao, X Chen, Y Xuan, Y Dong, D Wang, K Liang
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022
482022
Inferring attack intent of malicious insider based on probabilistic attack graph model
XJ Chen, BX Fang, QF Tan, H Zhang
Chinese Journal of Computers 37 (1), 62-72, 2014
422014
: Oblivious Defender for Private Byzantine-Robust Federated Learning with Dishonest-Majority
Y Dong, X Chen, K Li, D Wang, S Zeng
European Symposium on Research in Computer Security, 497-518, 2021
382021
Privacy-preserving distributed machine learning based on secret sharing
Y Dong, X Chen, L Shen, D Wang
Information and Communications Security: 21st International Conference …, 2020
242020
A multi-level analysis framework in network security situation awareness
H Zhang, J Shi, X Chen
Procedia Computer Science 17, 530-536, 2013
242013
Efficient and secure federated learning based on secret sharing and gradients selection
Y Dong, W Hou, X Chen, S Zeng
Journal of Computer Research and Development 57 (10), 2241-2250, 2020
202020
Detecting insider threat based on document access behavior analysis
R Zhang, X Chen, J Shi, F Xu, Y Pu
Web Technologies and Applications: APWeb 2014 Workshops, SNA, NIS, and IoTS …, 2014
202014
Survey on automatic text summarization
J Li, C Zhang, X Chen, Y Hu, P Liao
J. Comput. Res. Dev 58, 1-21, 2021
192021
Clts: A new chinese long text summarization dataset
X Liu, C Zhang, X Chen, Y Cao, J Li
CCF International Conference on Natural Language Processing and Chinese …, 2020
182020
Implementation and evaluation of different parallel designs of AES using CUDA
J Ma, X Chen, R Xu, J Shi
2017 IEEE second international conference on data science in cyberspace (DSC …, 2017
182017
Abstractive text summarization with multi-head attention
J Li, C Zhang, X Chen, Y Cao, P Liao, P Zhang
2019 international joint conference on neural networks (ijcnn), 1-8, 2019
152019
Efficient and private set intersection of human genomes
L Shen, X Chen, D Wang, B Fang, Y Dong
2018 IEEE International Conference on Bioinformatics and Biomedicine (BIBM …, 2018
152018
A multiple watermarking algorithm for texts mixed Chinese and English
X Rui, C XiaoJun, S Jinqiao
Procedia Computer Science 17, 844-851, 2013
132013
An efficient 3-party framework for privacy-preserving neural network inference
L Shen, X Chen, J Shi, Y Dong, B Fang
European Symposium on Research in Computer Security, 419-439, 2020
122020
Data stolen trojan detection based on network behaviors
Y Pu, X Chen, X Cui, J Shi, L Guo, C Qi
Procedia Computer Science 17, 828-835, 2013
122013
A practical real-time authentication system with Identity Tracking based on mouse dynamics
X Chen, F Xu, R Xu, SM Yiu, J Shi
2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2014
112014
Towards misdirected email detection for preventing information leakage
T Liu, Y Pu, J Shi, Q Li, X Chen
2014 IEEE Symposium on Computers and Communications (ISCC), 1-6, 2014
102014
The system can't perform the operation now. Try again later.
Articles 1–20