
Shuhui Chen
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j14]Wei Zhao
, Hui Gao, Shuhui Chen, Nan Wang:
Generative Multi-Task Learning for Text Classification. IEEE Access 8: 86380-86387 (2020) - [j13]Xin Wang
, Shuhui Chen, Jinshu Su
:
Automatic Mobile App Identification From Encrypted Traffic With Hybrid Neural Networks. IEEE Access 8: 182065-182077 (2020) - [j12]Ruihong Yao, Fei Wang, Shuhui Chen, Shuang Zhao:
GroupSeeker: An Applicable Framework for Travel Companion Discovery from Vast Trajectory Data. ISPRS Int. J. Geo Inf. 9(6): 404 (2020) - [j11]Xin Wang
, Shuhui Chen
, Jinshu Su:
Real Network Traffic Collection and Deep Learning for Mobile App Identification. Wirel. Commun. Mob. Comput. 2020: 4707909:1-4707909:14 (2020) - [c30]Xin Wang, Shuhui Chen, Jinshu Su:
App-Net: A Hybrid Neural Network for Encrypted Mobile Traffic Classification. INFOCOM Workshops 2020: 424-429
2010 – 2019
- 2019
- [j10]Jie Li
, Jinshu Su
, Rongmao Chen, Xiaofeng Wang, Shuhui Chen:
Practical privacy-preserving deep packet inspection outsourcing. Concurr. Comput. Pract. Exp. 31(22) (2019) - [j9]Chuan Yu
, Shuhui Chen
, Zhiping Cai
:
LTE Phone Number Catcher: A Practical Attack against Mobile Privacy. Secur. Commun. Networks 2019: 7425235:1-7425235:10 (2019) - [j8]Shuang Zhao, Shuhui Chen
, Yipin Sun, Zhiping Cai
, Jinshu Su
:
Identifying Known and Unknown Mobile Application Traffic Using a Multilevel Classifier. Secur. Commun. Networks 2019: 9595081:1-9595081:11 (2019) - [j7]Zhenfeng Gao
, Yushun Fan, Cheng Wu
, Wei Tan
, Jia Zhang
, Yayu Ni, Bing Bai
, Shuhui Chen
:
SeCo-LDA: Mining Service Co-Occurrence Topics for Composition Recommendation. IEEE Trans. Serv. Comput. 12(3): 446-459 (2019) - [c29]Junqiu Liu, Fei Wang, Shuang Zhao, Xin Wang, Shuhui Chen:
iMonitor, An APP-Level Traffic Monitoring and Labeling System for iOS Devices. CSE/EUC 2019: 211-218 - [c28]Panyu Liu, Yangyang Li, Zhiping Cai, Shuhui Chen:
Discovering New Sensitive Words Based on Sensitive Information Categorization. ICAIS (1) 2019: 338-346 - [c27]Ruihong Yao, Fei Wang, Shuhui Chen:
TCoD: A Traveling Companion Discovery Method Based on Clustering and Association Analysis. IJCNN 2019: 1-7 - [c26]Chuan Yu
, Shuhui Chen:
On Effects of Mobility Management Signalling Based DoS Attacks Against LTE Terminals. IPCCC 2019: 1-8 - [c25]Shuhui Chen, Shuang Zhao, Biao Han, Xiaoyan Wang:
Investigating and Revealing Privacy Leaks in Mobile Application Traffic. Wireless Days 2019: 1-4 - 2018
- [j6]Jianliang Huang
, Kai Leung Ray Su, Yiu Yin Raymond Lee, Shuhui Chen:
Various Bifurcation Phenomena in a Nonlinear Curved Beam Subjected to Base Harmonic Excitation. Int. J. Bifurc. Chaos 28(7): 1830023 (2018) - [c24]Lin Liu, Jinshu Su, Rongmao Chen, Ximeng Liu, Xiaofeng Wang, Shuhui Chen, Ho-fung Leung:
Privacy-Preserving Mining of Association Rule on Outsourced Cloud Data from Multiple Parties. ACISP 2018: 431-451 - [c23]Chengcheng Xu, Jinshu Su
, Shuhui Chen:
Exploring Efficient NFA Data Structures to Accelerate DFA Generation. ICCSP 2018: 56-61 - [c22]Wei Zhou, Yiying Li, Shuhui Chen, Baokang Zhao:
Layer-weakening feature fusion network for remote sensing detection. ICIMCS 2018: 14:1-14:6 - [c21]Shuang Zhao, Shuhui Chen:
Smartphone Application Identification by Convolutional Neural Network. MLICOM 2018: 105-114 - [c20]Yusheng Xia, Jinshu Su
, Rongmao Chen, Yaping Liu, Shuhui Chen:
A Real-Time Aware Routing Strategy in Smart City Environments. SECON Workshops 2018: 9-14 - [c19]Wei Zhou, Yiying Li, Shuhui Chen, Bo Ding:
Real-Time Data Processing Architecture for Multi-Robots Based on Differential Federated Learning. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 462-471 - 2017
- [j5]Yangyang Chen, Shuhui Chen, Wei Zhao:
Constructing explicit homoclinic solution of oscillators: An improvement for perturbation procedure based on nonlinear time transformation. Commun. Nonlinear Sci. Numer. Simul. 48: 123-139 (2017) - [j4]Shuhui Chen, Yushun Fan, Wei Tan, Jia Zhang, Bing Bai, Zhenfeng Gao:
Service Recommendation Based on Separated Time-aware Collaborative Poisson Factorization. J. Web Eng. 16(7&8): 595-618 (2017) - [c18]Jie Li, Jinshu Su, Xiaofeng Wang, Hao Sun, Shuhui Chen:
CloudDPI: Cloud-Based Privacy-Preserving Deep Packet Inspection via Reversible Sketch. CSS 2017: 119-134 - [c17]Yuanhang Yang, Shuhui Chen:
Multiple Bloom filters. ICNCC 2017: 59-63 - [c16]Chengcheng Xu, Jinshu Su
, Shuhui Chen, Biao Han:
Offset-FA: Detach the Closures and Countings for Efficient Regular Expression Matching. SC² 2017: 263-266 - 2016
- [j3]Chengcheng Xu, Shuhui Chen, Jinshu Su
, Siu-Ming Yiu, Lucas Chi Kwong Hui:
A Survey on Regular Expression Matching for Deep Packet Inspection: Applications, Algorithms, and Hardware Platforms. IEEE Commun. Surv. Tutorials 18(4): 2991-3029 (2016) - [c15]Jie Li, Shuhui Chen, Jinshu Su
:
Implementation of TCP large receive offload on multi-core NPU platform. ICTC 2016: 258-263 - [c14]Zhenfeng Gao, Yushun Fan, Cheng Wu, Wei Tan, Jia Zhang, Yayu Ni, Bing Bai, Shuhui Chen:
SeCo-LDA: Mining Service Co-occurrence Topics for Recommendation. ICWS 2016: 25-32 - [c13]Shuhui Chen, Yushun Fan, Wei Tan, Jia Zhang, Bing Bai, Zhenfeng Gao:
Time-Aware Collaborative Poisson Factorization for Service Recommendation. ICWS 2016: 196-203 - [c12]Wei Xie, Yong Tang, Shuhui Chen, Yi Zhang, Yuanming Gao:
Security of Web of Things: A Survey. IWSEC 2016: 61-70 - [c11]Chengcheng Xu, Baokang Zhao, Shuhui Chen, Jinshu Su:
A Novel Hybrid Architecture for High Speed Regular Expression Matching. MobiSec 2016: 164-174 - [c10]Jinshu Su
, Shuhui Chen, Biao Han, Chengcheng Xu, Xin Wang:
A 60Gbps DPI Prototype based on Memory-Centric FPGA. SIGCOMM 2016: 627-628 - 2015
- [c9]Chengcheng Xu, Shuhui Chen, Xiaofeng Wang, Jinshu Su:
An Efficient Pre-filter to Accelerate Regular Expression Matching. ICA3PP (Workshops and Symposiums) 2015: 111-119 - [c8]Bing Bai, Yushun Fan, Keman Huang, Wei Tan, Bofei Xia, Shuhui Chen:
Service Recommendation for Mashup Creation Based on Time-Aware Collaborative Domain Regression. ICWS 2015: 209-216 - [c7]Yipin Sun, Shuhui Chen, Biao Han, Bofeng Zhang, Jinshu Su:
A Novel Location Privacy Mining Threat in Vehicular Internet Access Service. WASA 2015: 467-476 - 2014
- [j2]Shuhui Chen, Rongxing Lu:
A regular expression matching engine with hybrid memories. Comput. Stand. Interfaces 36(5): 880-888 (2014) - [j1]Shuhui Chen, Rongxing Lu, Xuemin (Sherman) Shen:
SRC: a multicore NPU-based TCP stream reassembly card for deep packet inspection. Secur. Commun. Networks 7(2): 265-278 (2014) - [c6]Guohong Zhao, Shuhui Chen, Baokang Zhao, Ilsun You, Jinshu Su, Wanrong Yu:
A High-Speed Network Content Filtering System. CD-ARES 2014: 257-269 - 2013
- [c5]Shuhui Chen, Xiuli Xie, Zhao Zeng, JingJie Yu, Chuanjian Lu:
Study of the regularities in the treatment of psoriasis vulgaris by TCM: Applying association rule mining to TCM literature. BIBM 2013: 15-17 - [c4]Yue Zhao, Yong Tang, Yijie Wang, Shuhui Chen:
Generating malware signature using transcoding from sequential data to amino acid sequence. HPCS 2013: 266-272 - 2012
- [c3]Shuhui Chen, Yong Tang:
A Stream Reassembly Mechanism Based on DPI. IPDPS Workshops 2012: 1204-1209 - 2011
- [c2]Yan Li, Biyun Xu, Shuhui Chen, Peng Liu, Aihua Ou, Yan Xu, Zehuai Wen
, Biyang Ou, Ruiyu Xu, Zhaozhang Wei, Liang Zeng:
A randomized, controlled study of efficacy and safety on mild to moderate insomnia intervened by Chinese medicine in the integrated program. BIBM Workshops 2011: 732-739 - [c1]Lei Wang, Shuhui Chen, Yong Tang, Jinshu Su
:
Gregex: GPU Based High Speed Regular Expression Matching Engine. IMIS 2011: 366-370
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2020-11-14 22:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint