default search action
Kangfeng Zheng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j54]Xiujuan Wang, Keke Wang, Kangmiao Chen, Zhengxiang Wang, Kangfeng Zheng:
Unsupervised twitter social bot detection using deep contrastive graph clustering. Knowl. Based Syst. 293: 111690 (2024) - [j53]Haoyu Wang, Chunhua Wu, Kangfeng Zheng:
Defense against adversarial attacks based on color space transformation. Neural Networks 173: 106176 (2024) - [j52]Xiujuan Wang, Kangmiao Chen, Keke Wang, Zhengxiang Wang, Kangfeng Zheng, Jiayue Zhang:
FedKG: A Knowledge Distillation-Based Federated Graph Method for Social Bot Detection. Sensors 24(11): 3481 (2024) - 2023
- [j51]Rundong Yang, Kangfeng Zheng, Xiujuan Wang, Bin Wu, Chunhua Wu:
Social Engineering Attack-Defense Strategies Based on Reinforcement Learning. Comput. Syst. Sci. Eng. 47(2): 2153-2170 (2023) - [j50]Yutong Shi, Xiujuan Wang, Kangfeng Zheng, Siwei Cao:
User authentication method based on keystroke dynamics and mouse dynamics using HDA. Multim. Syst. 29(2): 653-668 (2023) - [j49]Minjiao Yang, Kangfeng Zheng, Xiujuan Wang, Yudao Sun, Zhe Chen:
Comparative Analysis of ASV Spoofing Countermeasures: Evaluating Res2Net-Based Approaches. IEEE Signal Process. Lett. 30: 1272-1276 (2023) - 2022
- [j48]Rundong Yang, Kangfeng Zheng, Bin Wu, Di Li, Zhe Wang, Xiujuan Wang:
Predicting User Susceptibility to Phishing Based on Multidimensional Features. Comput. Intell. Neurosci. 2022: 7058972:1-7058972:11 (2022) - [j47]Yanping Shen, Kangfeng Zheng, Chunhua Wu:
A Hybrid PSO-BPSO Based Kernel Extreme Learning Machine Model for Intrusion Detection. J. Inf. Process. Syst. 18(1): 146-158 (2022) - [j46]Xiujuan Wang, Yutong Shi, Kangfeng Zheng, Yuyang Zhang, Weijie Hong, Siwei Cao:
User Authentication Method Based on Keystroke Dynamics and Mouse Dynamics with Scene-Irrelated Features in Hybrid Scenes. Sensors 22(17): 6627 (2022) - [c19]Huan Zhang, Rongliang Chen, Kangfeng Zheng, Liang Gu, Xiujuan Wang:
Moving Target Defense Strategy Selection Method Based on Long-term Traffic Prediction. ICDIS 2022: 220-227 - 2021
- [j45]Yudao Sun, Chunhua Wu, Kangfeng Zheng, Xinxin Niu:
Adv-Emotion: The Facial Expression Adversarial Attack. Int. J. Pattern Recognit. Artif. Intell. 35(11): 2152016:1-2152016:23 (2021) - [j44]Yudao Sun, Juan Yin, Chunhua Wu, Kangfeng Zheng, Xinxin Niu:
Generating facial expression adversarial examples based on saliency map. Image Vis. Comput. 116: 104318 (2021) - [j43]Xiujuan Wang, Yi Sui, Kangfeng Zheng, Yutong Shi, Siwei Cao:
Personality Classification of Social Users Based on Feature Fusion. Sensors 21(20): 6758 (2021) - [j42]Rundong Yang, Kangfeng Zheng, Bin Wu, Chunhua Wu, Xiujuan Wang:
Phishing Website Detection Based on Deep Convolutional Neural Network and Random Forest Ensemble Learning. Sensors 21(24): 8281 (2021) - [j41]Xu Wang, Xuan Zha, Wei Ni, Ren Ping Liu, Y. Jay Guo, Xinxin Niu, Kangfeng Zheng:
Game Theoretic Suppression of Forged Messages in Online Social Networks. IEEE Trans. Syst. Man Cybern. Syst. 51(3): 1601-1611 (2021) - [c18]Maonan Wang, Kangfeng Zheng, Xinyi Ning, Yanqing Yang, Xiujuan Wang:
CENTIME: A Direct Comprehensive Traffic Features Extraction for Encrypted Traffic Classification. ICCCS 2021: 490-498 - [c17]Zhe Wang, Kangfeng Zheng, Qingbiao Li, Maonan Wang, Xiujuan Wang:
Adversarial Text Generation for Personality Privacy Protection. DSIT 2021: 159-165 - 2020
- [j40]Jinsong Zhang, Kangfeng Zheng, Dongmei Zhang, Bo Yan:
AATMS: An Anti-Attack Trust Management Scheme in VANET. IEEE Access 8: 21077-21090 (2020) - [j39]Bin Wu, Le Liu, Yanqing Yang, Kangfeng Zheng, Xiujuan Wang:
Using Improved Conditional Generative Adversarial Networks to Detect Social Bots on Twitter. IEEE Access 8: 36664-36680 (2020) - [j38]Yanqing Yang, Kangfeng Zheng, Bin Wu, Yixian Yang, Xiujuan Wang:
Network Intrusion Detection Based on Supervised Adversarial Variational Auto-Encoder With Regularization. IEEE Access 8: 42169-42184 (2020) - [j37]Maonan Wang, Kangfeng Zheng, Yanqing Yang, Xiujuan Wang:
An Explainable Machine Learning Framework for Intrusion Detection Systems. IEEE Access 8: 73127-73141 (2020) - [j36]Kangfeng Zheng, Xiujuan Wang, Bin Wu, Tong Wu:
Feature subset selection combining maximal information entropy and maximal information coefficient. Appl. Intell. 50(2): 487-501 (2020) - [j35]Xiujuan Wang, Haoyang Tang, Kangfeng Zheng, Yuanrui Tao:
Detection of compromised accounts for online social networks based on a supervised analytical hierarchy process. IET Inf. Secur. 14(4): 401-409 (2020) - [j34]Yanping Shen, Kangfeng Zheng, Chunhua Wu, Yixian Yang:
A Nature-inspired Multiple Kernel Extreme Learning Machine Model for Intrusion Detection. KSII Trans. Internet Inf. Syst. 14(2): 702-723 (2020) - [j33]Daojing He, Qi Qiao, Jiahao Gao, Sammy Chan, Kangfeng Zheng, Nadra Guizani:
Simulation Design for Security Testing of Integrated Electronic Systems. IEEE Netw. 34(1): 159-165 (2020) - [j32]Xiujuan Wang, Qianqian Zheng, Kangfeng Zheng, Tong Wu:
User Authentication Method Based on MKL for Keystroke and Mouse Behavioral Feature Fusion. Secur. Commun. Networks 2020: 9282380:1-9282380:14 (2020) - [j31]Zhe Wang, Bo Yan, Chunhua Wu, Bin Wu, Xiujuan Wang, Kangfeng Zheng:
Graph Adaptation Network with Domain-Specific Word Alignment for Cross-Domain Relation Extraction. Sensors 20(24): 7180 (2020) - [i2]Qingbiao Li, Chunhua Wu, Kangfeng Zheng, Zhe Wang:
Hierarchical Transformer Network for Utterance-level Emotion Recognition. CoRR abs/2002.07551 (2020) - [i1]Qingbiao Li, Chunhua Wu, Kangfeng Zheng:
Text Classification with Lexicon from PreAttention Mechanism. CoRR abs/2002.07591 (2020)
2010 – 2019
- 2019
- [j30]Yuhua Wang, Chunhua Wu, Kangfeng Zheng, Xiujuan Wang:
Improving Reliability: User Authentication on Smartphones Using Keystroke Biometrics. IEEE Access 7: 26218-26228 (2019) - [j29]Huan Zhang, Kangfeng Zheng, Xiujuan Wang, Shoushan Luo, Bin Wu:
Efficient Strategy Selection for Moving Target Defense Under Multiple Attacks. IEEE Access 7: 65982-65995 (2019) - [j28]Kangfeng Zheng, Tong Wu, Xiujuan Wang, Bin Wu, Chunhua Wu:
A Session and Dialogue-Based Social Engineering Framework. IEEE Access 7: 67781-67794 (2019) - [j27]Zhe Wang, Chunhua Wu, Kangfeng Zheng, Xinxin Niu, Xiujuan Wang:
SMOTETomek-Based Resampling for Personality Recognition. IEEE Access 7: 129678-129689 (2019) - [j26]Xu Wang, Xuan Zha, Wei Ni, Ren Ping Liu, Y. Jay Guo, Xinxin Niu, Kangfeng Zheng:
Survey on blockchain for Internet of Things. Comput. Commun. 136: 10-29 (2019) - [j25]Tong Wu, Kangfeng Zheng, Guangzhi Xu, Chunhua Wu, Xiujuan Wang:
User identification by keystroke dynamics using improved binary particle swarm optimisation. Int. J. Bio Inspired Comput. 14(3): 171-180 (2019) - [j24]Xu Wang, Guangsheng Yu, Xuan Zha, Wei Ni, Ren Ping Liu, Y. Jay Guo, Kangfeng Zheng, Xinxin Niu:
Capacity of blockchain based Internet-of-Things: Testbed and analysis. Internet Things 8 (2019) - [j23]Tong Wu, Kangfeng Zheng, Chunhua Wu, Xiujuan Wang:
User Identification Using Real Environmental Human Computer Interaction Behavior. KSII Trans. Internet Inf. Syst. 13(6): 3055-3073 (2019) - [j22]Bin Wu, Le Liu, Zhengge Dai, Xiujuan Wang, Kangfeng Zheng:
Detecting Malicious Social Robots with Generative Adversarial Networks. KSII Trans. Internet Inf. Syst. 13(11): 5594-5515 (2019) - [j21]Yanping Shen, Kangfeng Zheng, Chunhua Wu, Yixian Yang:
A Neighbor Prototype Selection Method Based on CCHPSO for Intrusion Detection. Secur. Commun. Networks 2019: 1283495:1-1283495:9 (2019) - [j20]Xu Wang, Bo Song, Wei Ni, Ren Ping Liu, Y. Jay Guo, Xinxin Niu, Kangfeng Zheng:
Group-Based Susceptible-Infectious-Susceptible Model in Large-Scale Directed Networks. Secur. Commun. Networks 2019: 1657164:1-1657164:9 (2019) - [j19]Yanqing Yang, Kangfeng Zheng, Chunhua Wu, Yixian Yang:
Improving the Classification Effectiveness of Intrusion Detection by Using Improved Conditional Variational AutoEncoder and Deep Neural Network. Sensors 19(11): 2528 (2019) - [c16]Xiujuan Wang, Chenxi Zhang, Kangfeng Zheng, Haoyang Tang, Yuanrui Tao:
Detecting Spear-phishing Emails Based on Authentication. ICCCS 2019: 450-456 - [c15]Huan Zhang, Kangfeng Zheng, Xiaodan Yan, Shoushan Luo, Bin Wu:
Moving Target Defense Against Injection Attacks. ICA3PP (1) 2019: 518-532 - 2018
- [j18]Yang Zhou, Kangfeng Zheng, Wei Ni, Ren Ping Liu:
Elastic Switch Migration for Control Plane Load Balancing in SDN. IEEE Access 6: 3909-3919 (2018) - [j17]Yanping Shen, Kangfeng Zheng, Chunhua Wu, Mingwu Zhang, Xinxin Niu, Yixian Yang:
An Ensemble Method based on Selection Using Bat Algorithm for Intrusion Detection. Comput. J. 61(4): 526-538 (2018) - [j16]Kangfeng Zheng, Xiujuan Wang:
Feature selection method with joint maximal information entropy between features and class. Pattern Recognit. 77: 20-29 (2018) - [j15]Xuan Zha, Wei Ni, Xu Wang, Ren Ping Liu, Y. Jay Guo, Xinxin Niu, Kangfeng Zheng:
The Impact of Link Duration on the Integrity of Distributed Mobile Networks. IEEE Trans. Inf. Forensics Secur. 13(9): 2240-2255 (2018) - [c14]Xu Wang, Xuan Zha, Yu Gu, Wei Ni, Ren Ping Liu, Y. Jay Guo, Xinxin Niu, Kangfeng Zheng:
Attack and Defence of Ethereum Remote APIs. GLOBECOM Workshops 2018: 1-6 - [c13]Yahan Wang, Chunhua Wu, Kangfeng Zheng, Xiujuan Wang:
Social Bot Detection Using Tweets Similarity. SecureComm (2) 2018: 63-78 - 2017
- [j14]Yanping Xu, Chunhua Wu, Kangfeng Zheng, Xinxin Niu, Yixian Yang:
Fuzzy-synthetic minority oversampling technique: Oversampling based on fuzzy set theory for Android malware detection in imbalanced datasets. Int. J. Distributed Sens. Networks 13(4) (2017) - [j13]Yixun Hu, Kangfeng Zheng, Xu Wang, Yixian Yang:
WORM-HUNTER: A Worm Guard System using Software-defined Networking. KSII Trans. Internet Inf. Syst. 11(1): 484-510 (2017) - [j12]Yanping Xu, Chunhua Wu, Kangfeng Zheng, Xinxin Niu, Tianling Lu:
Feature Selection to Mine Joint Features from High-dimension Space for Android Malware Detection. KSII Trans. Internet Inf. Syst. 11(9): 4658-4679 (2017) - [j11]Yanping Xu, Chunhua Wu, Kangfeng Zheng, Xu Wang, Xinxin Niu, Tianliang Lu:
Computing Adaptive Feature Weights with PSO to Improve Android Malware Detection. Secur. Commun. Networks 2017: 3284080:1-3284080:14 (2017) - [j10]Yang Zhou, Wei Ni, Kangfeng Zheng, Ren Ping Liu, Yixian Yang:
Scalable Node-Centric Route Mutation for Defense of Large-Scale Software-Defined Networks. Secur. Commun. Networks 2017: 4651395:1-4651395:13 (2017) - [j9]Xuan Zha, Wei Ni, Kangfeng Zheng, Ren Ping Liu, Xinxin Niu:
Collaborative Authentication in Decentralized Dense Mobile Networks With Key Predistribution. IEEE Trans. Inf. Forensics Secur. 12(10): 2261-2275 (2017) - [c12]Yang Zhou, Wei Ni, Kangfeng Zheng, Ren Ping Liu, Yixian Yang:
Node-centric route mutation for large-scale SDN based on 3D earth mover's distance model. ISCIT 2017: 1-6 - [c11]Xuan Zha, Xu Wang, Wei Ni, Ren Ping Liu, Y. Jay Guo, Xinxin Niu, Kangfeng Zheng:
Analytic model on data security in VANETs. ISCIT 2017: 1-6 - 2016
- [j8]Weixin Liu, Kangfeng Zheng, Bin Wu, Chunhua Wu, Xinxin Niu:
Flow-based Anomaly Detection Using Access Behavior Profiling and Time-sequenced Relation Mining. KSII Trans. Internet Inf. Syst. 10(6): 2781-2800 (2016) - [j7]Xu Wang, Wei Ni, Kangfeng Zheng, Ren Ping Liu, Xinxin Niu:
Virus Propagation Modeling and Convergence Analysis in Large-Scale Networks. IEEE Trans. Inf. Forensics Secur. 11(10): 2241-2254 (2016) - [c10]Xu Wang, Kangfeng Zheng, Xinxin Niu, Bin Wu, Chunhua Wu:
Detection of command and control in advanced persistent threat based on independent access. ICC 2016: 1-6 - [c9]Xuan Zha, Kangfeng Zheng, Dongmei Zhang:
Anti-Pollution Source Location Privacy Preserving Scheme in Wireless Sensor Networks. SECON 2016: 1-8 - 2015
- [j6]Fangfang Dai, Ying Hu, Kangfeng Zheng, Bin Wu:
Exploring risk flow attack graph for security risk assessment. IET Inf. Secur. 9(6): 344-353 (2015) - [j5]Fangfang Dai, Kangfeng Zheng, Bin Wu, Shoushan Luo:
Using Genetic Algorithm for Optimal Security Hardening in Risk Flow Attack Graph. KSII Trans. Internet Inf. Syst. 9(5): 1920-1937 (2015) - [c8]Xuan Zha, Wei Ni, Ren Ping Liu, Kangfeng Zheng, Xinxin Niu:
Secure Data Transmission and Modelling in Vehicular Ad Hoc Networks. GLOBECOM Workshops 2015: 1-6 - [c7]Fangfang Dai, Kangfeng Zheng, Shoushan Luo, Bin Wu:
Towards a multiobjective framework for evaluating network security under exploit attacks. ICC 2015: 7186-7191 - 2014
- [j4]Guoyuan Lin, Yuyu Bie, Min Lei, Kangfeng Zheng:
ACO-BTM: A Behavior Trust Model in Cloud Computing Environment. Int. J. Comput. Intell. Syst. 7(4): 785-795 (2014) - 2012
- [j3]Qian Xiao, Kangfeng Zheng, Shoushan Luo, Xu Cui:
A Secure Network Coding-based Data Gathering Model and Its Protocol in Wireless Sensor Networks. Int. J. Comput. Intell. Syst. 5(5): 887-895 (2012) - [j2]Rongrong Fu, Kangfeng Zheng, Tianliang Lu, Dongmei Zhang, Yixian Yang:
Biologically Inspired Anomaly Detection for Hierarchical Wireless Sensor Networks. J. Networks 7(8): 1214-1219 (2012) - [j1]Tianliang Lu, Kangfeng Zheng, Rongrong Fu, Yingqing Liu, Bin Wu, Shize Guo:
A Danger Theory Based Mobile Virus Detection Model and Its Application in Inhibiting Virus. J. Networks 7(8): 1227-1232 (2012) - 2011
- [c6]Qian Xiao, Kangfeng Zheng, Shoushan Luo, Yajian Zhou:
A study on energy efficient cluster-based network coding protocol for aggregated-data gathering in wireless sensor networks. GLOBECOM Workshops 2011: 1221-1225 - [c5]Hong Di, Kangfeng Zheng, Xinxin Niu, Xin Zhang:
Multiple-image compressed encryption and decryption by compressive holography. VCIP 2011: 1-4 - 2010
- [c4]Jian Gao, Yixian Yang, Kangfeng Zheng, Zhengming Hu:
Research of an Innovative P2P-Based Botnet. MVHI 2010: 214-218
2000 – 2009
- 2008
- [c3]Xin-lei Li, Kangfeng Zheng, Yixian Yang:
A Simulation Platform of DDoS Attack Based on Network Processor. CIS (1) 2008: 421-426 - [c2]Wei Zhang, Shize Guo, Kangfeng Zheng, Yixian Yang:
A Defending Mechanism against DDoS Based on Registration and Authentication. ICYCS 2008: 2192-2197 - 2007
- [c1]Bin Wu, Kangfeng Zheng, Yixian Yang:
A Data Safety Transmission Solution in Web Application. Web Intelligence/IAT Workshops 2007: 303-306
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-20 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint